Seqrite's APT Research Team has uncovered a sophisticated cyber-espionage campaign named Operation DupeHike, which is actively targeting corporate entities in Russia. The campaign, attributed to a threat actor cluster tracked as UNG0902, employs highly realistic social engineering tactics to gain initial access. The attackers specifically target employees in Human Resources (HR), payroll, and administrative roles using decoy documents related to internal financial policies and employee bonuses. The ultimate goal is to establish a persistent foothold for long-term surveillance and data exfiltration, suggesting a strategic interest in Russian corporate affairs.
The campaign was first identified on November 21, 2025, after a malicious ZIP archive was uploaded to VirusTotal. The initial access vector is a spear-phishing email containing a malicious archive disguised as an official HR notification, for example, about a 15% annual bonus. This high degree of customization and mimicry of internal corporate communications makes the phishing attempts particularly effective.
The focused targeting on Russian organizations and specific corporate departments (HR, payroll) indicates that UNG0902 has clear strategic objectives, which could be geopolitical or financial in nature. The actor demonstrates a high level of operational maturity and resourcefulness.
Operation DupeHike showcases several advanced TTPs that point to a mature threat actor:
T1566.001) as its primary entry point, delivering a malicious ZIP archive.T1204.002 - Malicious File) that align with corporate events and communication styles.VDSINA-AS and TIMEWEB-AS. This tactic helps the malicious traffic blend in with legitimate local traffic, making it harder to detect through geographical filtering.port 80 (HTTP) and port 443 (TLS/SSL) (T1071.001 - Web Protocols). This adaptation, likely in response to detection, shows an ability to quickly modify infrastructure to maintain operational persistence.The combination of these techniques suggests that UNG0902 is a well-resourced and possibly state-sponsored group.
A successful compromise by Operation DupeHike could lead to significant data loss for the targeted Russian corporations. By targeting HR and payroll departments, the attackers gain access to a treasure trove of sensitive information, including:
This data could be used for financial fraud, further espionage activities, or to exert geopolitical leverage.
No specific IP addresses or file hashes were provided in the source reports, but the ASNs used for C2 infrastructure were mentioned.
| Type | Value | Description |
|---|---|---|
| Network Traffic Pattern | Outbound connections to VDSINA-AS or TIMEWEB-AS |
Traffic to these Russian ASNs from sensitive corporate systems should be scrutinized, especially if it's from non-standard applications. |
| File Name | *bonus*.zip, *policy*.zip |
Be wary of ZIP archives with HR-related themes received via email. |
| Network Behavior | Port hopping between 80 and 443 | A host communicating with the same IP address first on port 80 and later on port 443 (or vice versa) could be a sign of adaptive C2. |
Conduct targeted training for high-risk departments like HR and finance to help them identify and report sophisticated spear-phishing attempts.
Implement strict egress filtering to block traffic to known malicious IPs and ASNs. Monitor for unusual patterns like port hopping.
Mapped D3FEND Techniques:
Utilize email security solutions that can scan inside archives and use sandboxing to analyze the behavior of suspicious files.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats