Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Microsoft warns that OAuth redirect abuse can deliver malware to government targets

Exposure to PFAS is associated with accelerated biological aging in men

The Longitude Prize on Dementia

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » SloppyLemming uses dual malware chain to target Pakistan and Bangladesh governments
Identity

SloppyLemming uses dual malware chain to target Pakistan and Bangladesh governments

userBy userMarch 3, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 3, 2026Malware/phishing

The threat activity cluster known as SloppyLemming is believed to be the result of new attacks targeting government agencies and critical infrastructure operators in Pakistan and Bangladesh.

According to Arctic Wolf, this activity occurred between January 2025 and January 2026. This activity involves the use of two different attack chains delivering malware families tracked as BurrowShell and Rust-based keyloggers.

“The use of the Rust programming language represents a significant evolution in SloppyLemming’s tools. Previous reports documented the attackers using only traditional compiled languages ​​and borrowing adversarial simulation frameworks such as Cobalt Strike, Havoc, and a custom NekroWire RAT,” the cybersecurity firm said in a report shared with The Hacker News.

SloppyLemming is the nickname assigned to a threat actor known to target governments, law enforcement, energy, telecommunications, and technology companies in Pakistan, Sri Lanka, Bangladesh, and China since at least 2022. It has also been tracked under the names Outrider Tiger and Fishing Elephant.

Previous campaigns launched by Hacking Team have utilized malware families such as Ares RAT and WarHawk, often driven by SideCopy and SideWinder, respectively.

Analysis of the latest attack by ArcticWolf reveals that spear phishing emails are used to deliver PDF lures and macro-enabled Excel documents to initiate infection chains. The attackers described themselves as operating at medium capacity.

The PDF decoy contains a URL designed to direct the victim to a ClickOnce application manifest, which deploys a legitimate Microsoft .NET runtime executable (‘NGenTask.exe’) and a malicious loader (‘mscorsvc.dll’). The loader is launched using DLL sideloading to decrypt and execute a custom x64 shellcode implant codenamed BurrowShell.

“BurrowShell is a full-featured backdoor that provides threat actors with file system manipulation, screenshot capture capabilities, remote shell execution, and SOCKS proxy functionality for network tunneling,” said Arctic Wolf. “The implant disguises command and control (C2) traffic as Windows Update service communications and employs RC4 encryption with a 32-character key for payload protection.”

The second attack chain uses an Excel document containing malicious macros to drop keylogger malware while also incorporating the ability to perform port scanning and network enumeration.

Further investigation into the threat actor’s infrastructure identified 112 Cloudflare Workers domains registered over the past year, an 8x increase from the 13 domains reported by Cloudflare in September 2024.

This campaign’s relationship with SloppyLemming is based on government-themed typosquatting patterns, deployment of the Havoc C2 framework, DLL sideloading techniques, and continued exploitation of Cloudflare Workers infrastructure by victimization patterns.

It is noteworthy that several aspects of the threat actor’s methodology, including the use of ClickOnce-enabled execution, overlap with the recent SideWinder campaign documented by Trellix in October 2025.

“Specifically, targeting Pakistan’s nuclear regulatory agency, defense logistics organization, and telecommunications infrastructure, along with Bangladeshi energy utilities and financial institutions, is consistent with intelligence gathering priorities consistent with South Asia’s regional strategic competition,” Arctic Wolf said.

“The dual payload deployment (in-memory shellcode BurrowShell for C2 and SOCKS proxy operations, and a Rust-based keylogger for information theft) suggests that the attackers maintain flexibility to deploy appropriate tools based on objective values ​​and operational requirements.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleChatGPT uninstalls jump 295% after agreement with Department of Defense
Next Article Google confirms CVE-2026-21385 in Qualcomm Android component has been exploited
user
  • Website

Related Posts

Microsoft warns that OAuth redirect abuse can deliver malware to government targets

March 3, 2026

Google confirms CVE-2026-21385 in Qualcomm Android component has been exploited

March 3, 2026

New Chrome vulnerability allows malicious extension to escalate privileges via Gemini panel

March 2, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Microsoft warns that OAuth redirect abuse can deliver malware to government targets

Exposure to PFAS is associated with accelerated biological aging in men

The Longitude Prize on Dementia

Google confirms CVE-2026-21385 in Qualcomm Android component has been exploited

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.