SloppyLemming Cyber Attacks Hit Government and Infrastructure in Pakistan, Bangladesh

A notorious cyber-attack group known as SloppyLemming has been linked to a large-scale malware campaign targeting government agencies and critical infrastructure operators in Pakistan and Bangladesh, according to a recent report by cybersecurity firm Arctic Wolf. The threat activity, observed between January 2025 and January 2026, used dual malware chains to deliver sophisticated payloads aimed at espionage and data theft.

SloppyLemming — tracked by security researchers under other aliases such as Outrider Tiger and Fishing Elephant — has a history of targeting government, law enforcement, energy, telecommunications, and high-tech sectors across South Asia and beyond. The recent campaign marks a notable evolution in the group’s toolkit, including the deployment of both a powerful backdoor and a Rust-based keylogger to achieve varied malicious outcomes.

Two Malware Chains, One Campaign

According to the Arctic Wolf analysis, the actor used two distinct attack chains to penetrate targeted systems:

  • BurrowShell Backdoor: Delivered via carefully crafted spear-phishing emails with malicious PDF attachments, this payload gives attackers full remote access. Once installed, it enables control over the file system, allows the capture of screenshots, opens a remote shell for command execution, and even sets up a SOCKS proxy for network tunnelling. The malicious traffic is disguised to resemble legitimate Windows Update communication, using RC4 encryption with a 32-character key to obfuscate command-and-control (C2) communication.
  • Rust-Based Keylogger: The second infection chain is embedded in macro-enabled Excel documents. When opened, it drops a Rust-based keylogger and reconnaissance tools capable of port scanning and enumerating network infrastructure, gathering sensitive information from within the victim’s environment.

Sophisticated Delivery and Infrastructure Abuse

The campaign commonly began with spear-phishing emails — malicious messages designed to look legitimate but containing booby-trapped document attachments. In some cases, these attachments led victims to ClickOnce manifests that loaded both a legitimate Microsoft .NET executable and a hidden malicious loader via DLL sideloading, a technique that loads harmful code under the guise of trusted binaries.

SloppyLemming also made heavy use of Cloudflare Workers domains to support its operations. In the past year, Arctic Wolf found 112 such domains linked to the actor’s infrastructure, a dramatic increase from previously flagged clusters. These Workers sites help relay malicious C2 traffic and make attribution and takedown harder for defenders.

History and Broader Target Set

SloppyLemming isn’t new to the cybersecurity landscape. Researchers have been tracking the group since at least 2022, with earlier campaigns using malware families such as Ares RAT and WarHawk in attacks across South and East Asia, including Sri Lanka, China, and Nepal. The actor predominantly targets government and critical infrastructure sectors using spear-phishing, credential harvesting, and custom tools like Cloud Phish to create malicious cloud-hosted resources for exfiltration.

Security professionals characterize SloppyLemming as moderately capable — its tools are advanced, but some operational security missteps have made elements of its infrastructure visible to defenders. Nonetheless, the combination of dual malware payloads and abuse of legitimate cloud services highlights the growing sophistication of cyber espionage against regional government and infrastructure targets.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch