Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SloppyLemming Espionage Targets South Asia with New Tools

SloppyLemming Espionage Targets South Asia with New Tools

Posted on March 3, 2026 By CWS

A suspected India-aligned cyber group, dubbed SloppyLemming, has been actively executing an espionage operation targeting various sectors in Pakistan and Bangladesh. These include government bodies, defense sectors, and critical infrastructure operators.

Details of the Campaign

Since 2021, SloppyLemming, also known by aliases Outrider Tiger and Fishing Elephant, has been deploying sophisticated malware tools. Between January 2025 and January 2026, they introduced two notable tools: a backdoor named BurrowShell and a Rust-based remote access trojan (RAT) with keylogging functionalities.

The attackers utilized two distinct spear-phishing methods to penetrate systems. The first method involved PDF documents with a blurred appearance accompanied by a deceptive “Download file” button, leading victims to a ClickOnce application that installed a multi-stage malware chain.

Attack Strategies and Tools

The second spear-phishing technique employed macro-enabled Excel spreadsheets. When opened, these sheets downloaded malicious payloads from attacker servers. Arctic Wolf researchers linked both strategies as part of a coordinated assault, utilizing DLL search order hijacking to execute malware within trusted Microsoft processes.

SloppyLemming’s infrastructure showed substantial growth, with Arctic Wolf tracing 112 Cloudflare Workers domains registered between January 2025 and January 2026. These domains mimicked legitimate government entities in Pakistan and Bangladesh, with registrations peaking in July 2025.

BurrowShell and Rust RAT Mechanics

The BurrowShell implant is an in-memory shellcode introduced through the ClickOnce method. A malicious DLL, mscorsvc.dll, placed alongside a Microsoft .NET binary, initiates the attack. If the malware’s checks confirm the process is legitimate, it persists by modifying system registry entries and decrypts an encrypted payload, BurrowShell, into memory.

Once operational, BurrowShell communicates with command-and-control servers, camouflaging its traffic as Windows Update. The Rust-based RAT, delivered via Excel macros, enhances capabilities by logging keystrokes and performing network scans.

Defensive Measures and Recommendations

Organizations in affected sectors should adopt specific cybersecurity measures. Blocking PDFs with embedded URLs, disabling macro execution in received documents, monitoring connections to suspicious domains, and inspecting encrypted traffic are crucial steps.

Further, endpoint security should alert on unusual DLL loading and registry modifications. Continuous security training is vital, as both attack strategies depend on user actions like clicking links or enabling macros.

Stay updated on cybersecurity developments by following us on Google News, LinkedIn, and X. For more insights, set CSN as your preferred news source on Google.

Cyber Security News Tags:Bangladesh, BurrowShell, Cloudflare, cyber defense, Cybersecurity, DLL hijacking, Espionage, Infrastructure, Keylogging, Malware, Pakistan, Rust RAT, SloppyLemming, spear-phishing, threat groups

Post navigation

Previous Post: Iranian Drone Attacks Expose Data Center Vulnerabilities
Next Post: LexisNexis Breach Exposes Data from AWS Servers

Related Posts

New Quantum Route Redirect Tool Lets Attackers Launch One-Click Phishing Attacks on Microsoft 365 Users New Quantum Route Redirect Tool Lets Attackers Launch One-Click Phishing Attacks on Microsoft 365 Users Cyber Security News
Top 5 Remote-Access And RMM Tools Most Abused By Threat Actors  Top 5 Remote-Access And RMM Tools Most Abused By Threat Actors  Cyber Security News
Parrot 7.0 Released with New Penetration Testing and AI Tools Parrot 7.0 Released with New Penetration Testing and AI Tools Cyber Security News
Microsoft Outlook Users Face Crashes When Creating New Emails, Temp Fix Issued Microsoft Outlook Users Face Crashes When Creating New Emails, Temp Fix Issued Cyber Security News
YONO SBI Banking App Vulnerability Let Attackers Execute a Man-in-the-Middle Attack YONO SBI Banking App Vulnerability Let Attackers Execute a Man-in-the-Middle Attack Cyber Security News
How to Stay Ahead of Vulnerabilities How to Stay Ahead of Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Archipelo and Checkmarx Forge AppSec Alliance
  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Archipelo and Checkmarx Forge AppSec Alliance
  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News