Trending Topics

Trending Topics
TRENDING TOPICS MAR 16, 2026

Operation CamelClone: Stealthy Multi‑Region Government Espionage

Operation CamelClone is a newly identified cyber espionage campaign targeting government and strategic sectors across multiple geopolitically significant regions, including Algeria, Mongolia, Ukraine, and Kuwait. The operation focuses on organizations tied to national security and policy, such as government ministries, defense and military bodies, diplomatic institutions, and energy sectors. Rather than using noisy infrastructure, the attackers abuse legitimate tools and public file‑sharing platforms to deliver malware and exfiltrate sensitive data, making their activity harder to spot. The campaign begins with spear‑phishing emails that deliver malicious ZIP archives containing a shortcut file and a decoy image themed around real entities and live geopolitical issues. Lures reference topics like Algerian housing ministries, cooperation with China, Algerian‑Ukrainian ties, and weapons requirements for the Kuwait Air Force, and use official logos to appear credible. When victims open the LNK file, a hidden PowerShell command pulls additional payloads from the public file‑sharing site filebulldogs[.]com, including a JavaScript loader dubbed HOPPINGANT that chains further PowerShell, decoy PDFs, and a secondary archive containing a legitimate Rclone executable. For data theft, the attackers repurpose Rclone as an exfiltration tool, quietly syncing stolen documents and Telegram Desktop session data to MEGA cloud storage using profiles configured with anonymous onionmail[.]org accounts. This approach allows them to avoid traditional C2 infrastructure and blend into normal cloud traffic, while rotating filebulldogs[.]com upload paths to support multiple parallel operations. Although Operation CamelClone has not yet been linked to a known threat group, its disciplined targeting of government, defense, diplomatic, and energy organizations points clearly to espionage motives, likely aimed at mapping foreign policy positions, defense capabilities, and diplomatic alignments amid growing global rivalries.

Ransomware in Early 2026: Near-Record Volume and Aggressive New Players

Ransomware activity in early 2026 remains extremely high, with 985 successful attacks recorded over the last 30 days across 59 distinct groups. Established actors are refining their operations while new and resurgent crews quickly scale up, creating a larger and more diverse threat pool. Qilin leads this period with 128 victims, closely followed by 0APT with 91, together accounting for over a fifth of observed activity and signaling heavy automation in initial access and data theft. Several groups are showing particularly sharp growth curves. NightSpire’s victim count has jumped from 18 to 71 in a month, and LockBit has surged from 15 to 65, highlighting that prior disruptions have not significantly reduced their capability or intent. Geographically, the United States remains the primary target with 444 victims, followed by Canada (42) and Great Britain (36), while Germany, France, and Thailand illustrate the continued spread of attacks across Europe and Southeast Asia. Newcomers AiLock and Handala, with 23 and 17 victims, respectively, after having none in the prior period, highlight how quickly new ransomware brands can gain traction under the RaaS model. Viewed over six months, monthly attack volumes have risen from 732 in October 2025 to near or above 900 since, peaking at 1,007 in January and rebounding to 985 after a brief dip in February. This pattern suggests not a temporary spike but a new baseline for ransomware operators' operational capacity. For defenders, this means shifting from purely reactive incident handling to proactive, intelligence-led defense: tracking which groups are most active, where they concentrate their targeting, and how their tactics evolve is now essential for meaningful risk management.

Poland Thwarts Cyberattack on Nuclear Research Center

Poland’s National Centre for Nuclear Research (NCBJ) recently stopped a targeted cyberattack on its IT infrastructure before any systems were compromised or safety was impacted. Internal security controls and incident‑response procedures detected the intrusion attempt early, allowing teams to secure affected systems and maintain full operational continuity. Throughout the incident, the MARIA research reactor, the country’s only operational nuclear reactor, remained fully secure and continued operating at full power, a point repeatedly emphasized by Director Professor Jakub Kupecki in public statements. According to NCBJ and supporting reports, the attack focused on business and IT networks rather than reactor control systems, and there is no indication that nuclear safety systems or physical processes were ever at risk. All production, research, and isotope‑generation activities continued without disruption, demonstrating the effectiveness of strict separation between conventional IT environments and the operational technology networks that control physical equipment. Following the incident, internal security teams were placed on elevated alert while log data, entry points, and network activity were reviewed to validate that no latent access or secondary compromise persisted. The response quickly expanded into a coordinated national effort. NCBJ notified relevant authorities and began working with Poland’s Research and Academic Computer Network, the Ministry of Digital Affairs, the Ministry of Energy, and the Deputy Prime Minister to investigate the intrusion and harden critical infrastructure defenses. Early investigation found that some attack “entry vectors” appeared to trace back to infrastructure linked with Iran, though officials have stressed that these indicators could be false flags and that no final attribution has been made. The case has drawn broader attention because it fits into a pattern of growing cyber activity against Polish critical infrastructure, and authorities are using threat intelligence from this incident to bolster protections across other national assets.

💡
Hunter Strategy encourages our readers to look for updates in our daily Trending Topics and on Twitter.

Read more