Seqrite's APT Research Team has uncovered a sophisticated cyber-espionage campaign named Operation DupeHike, which is actively targeting corporate entities in Russia. The campaign, attributed to a threat actor cluster tracked as UNG0902, employs highly realistic social engineering tactics to gain initial access. The attackers specifically target employees in Human Resources (HR), payroll, and administrative roles using decoy documents related to internal financial policies and employee bonuses. The ultimate goal is to establish a persistent foothold for long-term surveillance and data exfiltration, suggesting a strategic interest in Russian corporate affairs.
The campaign was first identified on November 21, 2025, after a malicious ZIP archive was uploaded to VirusTotal. The initial access vector is a spear-phishing email containing a malicious archive disguised as an official HR notification, for example, about a 15% annual bonus. This high degree of customization and mimicry of internal corporate communications makes the phishing attempts particularly effective.
The focused targeting on Russian organizations and specific corporate departments (HR, payroll) indicates that UNG0902 has clear strategic objectives, which could be geopolitical or financial in nature. The actor demonstrates a high level of operational maturity and resourcefulness.
Operation DupeHike showcases several advanced TTPs that point to a mature threat actor:
T1566.001) as its primary entry point, delivering a malicious ZIP archive.T1204.002 - Malicious File) that align with corporate events and communication styles.VDSINA-AS and TIMEWEB-AS. This tactic helps the malicious traffic blend in with legitimate local traffic, making it harder to detect through geographical filtering.port 80 (HTTP) and port 443 (TLS/SSL) (T1071.001 - Web Protocols). This adaptation, likely in response to detection, shows an ability to quickly modify infrastructure to maintain operational persistence.The combination of these techniques suggests that UNG0902 is a well-resourced and possibly state-sponsored group.
A successful compromise by Operation DupeHike could lead to significant data loss for the targeted Russian corporations. By targeting HR and payroll departments, the attackers gain access to a treasure trove of sensitive information, including:
This data could be used for financial fraud, further espionage activities, or to exert geopolitical leverage.
No specific IP addresses or file hashes were provided in the source reports, but the ASNs used for C2 infrastructure were mentioned.
VDSINA-AS or TIMEWEB-AS*bonus*.zip, *policy*.zipConduct targeted training for high-risk departments like HR and finance to help them identify and report sophisticated spear-phishing attempts.
Implement strict egress filtering to block traffic to known malicious IPs and ASNs. Monitor for unusual patterns like port hopping.
Mapped D3FEND Techniques:
Utilize email security solutions that can scan inside archives and use sandboxing to analyze the behavior of suspicious files.
Mapped D3FEND Techniques:
Seqrite's APT Research Team discovers the Operation DupeHike campaign after a malicious ZIP archive is seen on VirusTotal.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.