Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SloppyLemming Uses New Malware Chains on South Asian Governments

SloppyLemming Uses New Malware Chains on South Asian Governments

Posted on March 3, 2026 By CWS

The cyber threat group known as SloppyLemming has launched a new wave of attacks on government bodies and critical infrastructure in Pakistan and Bangladesh. This activity, which spanned from January 2025 to January 2026, employs two distinct malware chains to deliver the BurrowShell backdoor and a Rust-based keylogger, according to cybersecurity firm Arctic Wolf.

New Tools and Techniques

SloppyLemming’s adoption of the Rust programming language marks a significant shift in their approach, as they previously relied on more conventional compiled languages. Their arsenal now includes the BurrowShell backdoor and a custom keylogger, signifying enhanced capabilities. Historically, they have utilized adversary simulation frameworks like Cobalt Strike and Havoc, as well as the NekroWire RAT.

Known for targeting entities in Pakistan, Sri Lanka, Bangladesh, and China, SloppyLemming has been active since at least 2022. They are also identified by names such as Outrider Tiger and Fishing Elephant. Past operations have involved malware like Ares RAT and WarHawk, often linked to SideCopy and SideWinder groups.

Infection Vectors and Capabilities

The recent attacks leveraged spear-phishing emails with PDF and macro-enabled Excel documents to initiate infections. These documents lead victims to ClickOnce application manifests, deploying both a legitimate Microsoft .NET executable and a malicious loader. This loader, using DLL side-loading, decrypts and executes the BurrowShell implant.

BurrowShell, a versatile backdoor, offers file manipulation, screenshot capture, remote shell execution, and network tunneling capabilities. It disguises its command-and-control traffic as Windows Update service activity, using RC4 encryption to protect payloads. The second malware chain involves Excel documents dropping a keylogger, capable of port scanning and network enumeration.

Implications and Future Outlook

Arctic Wolf’s analysis reveals that SloppyLemming registered 112 Cloudflare Workers domains over the past year, a sharp increase from previous figures. These domains, used for typo-squatting government themes, align with SloppyLemming’s known tactics and target profiles.

Some methods, such as ClickOnce execution, overlap with recent SideWinder activities, hinting at shared strategies. The focus on Pakistani nuclear and defense sectors, alongside Bangladeshi energy and financial institutions, suggests a strategic intent to gather intelligence pertinent to regional competition in South Asia.

The dual deployment of BurrowShell and the Rust-based keylogger indicates SloppyLemming’s adaptability in using tools based on target value and mission objectives. As cyber threats continue to evolve, understanding these tactics is crucial for enhancing regional cybersecurity defenses.

The Hacker News Tags:Arctic Wolf, Bangladesh, BurrowShell, Cybersecurity, government attacks, Keylogger, Malware, Pakistan, Rust programming, SloppyLemming

Post navigation

Previous Post: Claude’s New Feature Simplifies AI Memory Transfer
Next Post: Novel Technique Reveals Vehicle Tracking via Tire Sensors

Related Posts

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices The Hacker News
CISA Alerts on Zimbra, SharePoint Vulnerabilities CISA Alerts on Zimbra, SharePoint Vulnerabilities The Hacker News
China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware The Hacker News
U.K. Police Just Seized £5.5 Billion in Bitcoin — The World’s Largest Crypto Bust U.K. Police Just Seized £5.5 Billion in Bitcoin — The World’s Largest Crypto Bust The Hacker News
DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft The Hacker News
.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark