Seqrite Reveals Operation CamelClone Targeting Global Government and Defense Entities
Operation CamelClone, a cyber espionage campaign uncovered by Seqrite, focuses on governmental and defense sectors across multiple countries, including Algeria, Mongolia, Ukraine, and Kuwait. The campaign utilizes spear-phishing tactics to deliver malware that extracts sensitive information while evading detection.

Seqrite has identified Operation CamelClone, an active cyber espionage operation targeting government and defense organizations in Algeria, Mongolia, Ukraine, and Kuwait. The campaign employs spear-phishing emails containing ZIP files with malicious Windows shortcut files, leading to the exfiltration of sensitive documents to anonymous cloud storage.
The malware, identified as HOPPINGANT, uses legitimate applications like Rclone to silently transfer data. The campaign is part of a larger trend in state-aligned threats, as noted in Seqrite's India Cyber Threat Report 2026, which recorded over 265 million detections, highlighting the rise of sophisticated cyber threats. This evolution poses significant risks to national security and critical infrastructure, necessitating enhanced vigilance and adaptive cybersecurity measures.




Comments