Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SloppyLemming Uses New Malware Chains on South Asian Governments

SloppyLemming Uses New Malware Chains on South Asian Governments

Posted on March 3, 2026 By CWS

The cyber threat group known as SloppyLemming has launched a new wave of attacks on government bodies and critical infrastructure in Pakistan and Bangladesh. This activity, which spanned from January 2025 to January 2026, employs two distinct malware chains to deliver the BurrowShell backdoor and a Rust-based keylogger, according to cybersecurity firm Arctic Wolf.

New Tools and Techniques

SloppyLemming’s adoption of the Rust programming language marks a significant shift in their approach, as they previously relied on more conventional compiled languages. Their arsenal now includes the BurrowShell backdoor and a custom keylogger, signifying enhanced capabilities. Historically, they have utilized adversary simulation frameworks like Cobalt Strike and Havoc, as well as the NekroWire RAT.

Known for targeting entities in Pakistan, Sri Lanka, Bangladesh, and China, SloppyLemming has been active since at least 2022. They are also identified by names such as Outrider Tiger and Fishing Elephant. Past operations have involved malware like Ares RAT and WarHawk, often linked to SideCopy and SideWinder groups.

Infection Vectors and Capabilities

The recent attacks leveraged spear-phishing emails with PDF and macro-enabled Excel documents to initiate infections. These documents lead victims to ClickOnce application manifests, deploying both a legitimate Microsoft .NET executable and a malicious loader. This loader, using DLL side-loading, decrypts and executes the BurrowShell implant.

BurrowShell, a versatile backdoor, offers file manipulation, screenshot capture, remote shell execution, and network tunneling capabilities. It disguises its command-and-control traffic as Windows Update service activity, using RC4 encryption to protect payloads. The second malware chain involves Excel documents dropping a keylogger, capable of port scanning and network enumeration.

Implications and Future Outlook

Arctic Wolf’s analysis reveals that SloppyLemming registered 112 Cloudflare Workers domains over the past year, a sharp increase from previous figures. These domains, used for typo-squatting government themes, align with SloppyLemming’s known tactics and target profiles.

Some methods, such as ClickOnce execution, overlap with recent SideWinder activities, hinting at shared strategies. The focus on Pakistani nuclear and defense sectors, alongside Bangladeshi energy and financial institutions, suggests a strategic intent to gather intelligence pertinent to regional competition in South Asia.

The dual deployment of BurrowShell and the Rust-based keylogger indicates SloppyLemming’s adaptability in using tools based on target value and mission objectives. As cyber threats continue to evolve, understanding these tactics is crucial for enhancing regional cybersecurity defenses.

The Hacker News Tags:Arctic Wolf, Bangladesh, BurrowShell, Cybersecurity, government attacks, Keylogger, Malware, Pakistan, Rust programming, SloppyLemming

Post navigation

Previous Post: Claude’s New Feature Simplifies AI Memory Transfer
Next Post: Novel Technique Reveals Vehicle Tracking via Tire Sensors

Related Posts

CISA Highlights Four Actively Exploited Security Vulnerabilities CISA Highlights Four Actively Exploited Security Vulnerabilities The Hacker News
Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers The Hacker News
 Google Sues China-Based Hackers Behind  Billion Lighthouse Phishing Platform  Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform The Hacker News
Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices The Hacker News
Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan The Hacker News
Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Archipelo and Checkmarx Forge AppSec Alliance
  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Archipelo and Checkmarx Forge AppSec Alliance
  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News