SloppyLemming Deploys BurrowShell and Rust-Based RAT to Target Pakistan and Bangladesh
An extensive cyber espionage campaign conducted by SloppyLemming, an India-nexus threat actor, targeted government entities and critical infrastructure in Pakistan and Bangladesh from January 2025 to January 2026. The campaign used two attack vectors: PDF lures with ClickOnce execution chains and macro-enabled Excel documents. It deployed a custom x64 shellcode implant named BurrowShell and a Rust-based keylogger. The attackers extensively abused Cloudflare Workers for C2 and payload delivery, registering 112 domains impersonating government entities. The campaign focused on nuclear, defense, telecommunications, energy, and financial sectors, aligning with regional strategic competition in South Asia.
AI Analysis
Technical Summary
The SloppyLemming threat actor, linked to India, executed a sophisticated cyber espionage campaign from January 2025 to January 2026 targeting Pakistan and Bangladesh. The attackers employed social engineering via PDF documents with ClickOnce execution chains and macro-enabled Excel files to gain initial access. Upon execution, they deployed BurrowShell, a custom 64-bit shellcode implant designed for stealth and persistence, alongside a Rust-based Remote Access Trojan (RAT) functioning as a keylogger. The campaign heavily abused Cloudflare Workers, a serverless platform, to host command and control infrastructure and deliver payloads, complicating detection and takedown efforts. Over 112 domains were registered, mimicking government entities to increase lure credibility. The campaign targeted critical sectors such as nuclear facilities, defense organizations, telecommunications providers, energy companies, and financial institutions, aligning with regional strategic competition. Techniques observed include DLL sideloading for code execution, credential dumping, use of living-off-the-land binaries, and evasion tactics to avoid detection. Despite the advanced tooling and infrastructure, exploitation required user interaction through opening malicious documents. No public exploits or patches are associated with this campaign, indicating a custom, targeted operation rather than widespread automated exploitation.
Potential Impact
This campaign poses a significant threat to the confidentiality and integrity of sensitive government and critical infrastructure data in Pakistan and Bangladesh. Successful compromise could lead to theft of classified information, disruption of critical services, and undermining of national security. The use of advanced malware and stealthy C2 infrastructure increases the difficulty of detection and response, potentially allowing prolonged espionage activity. The targeting of nuclear, defense, and telecommunications sectors could have cascading effects on regional stability and security. Financial sector intrusions may result in economic espionage or fraud. Organizations affected may face operational disruptions, reputational damage, and increased costs for incident response and remediation. The geopolitical context suggests potential escalation of cyber conflicts in South Asia, with broader implications for regional cybersecurity postures.
Mitigation Recommendations
Organizations in the targeted sectors should implement strict email and document handling policies, including disabling macros by default and blocking ClickOnce execution where possible. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying shellcode injection and unusual Rust-based process behaviors. Monitor and restrict the use of Cloudflare Workers and other serverless platforms for C2 traffic, employing network anomaly detection and DNS filtering to block suspicious domains, especially those impersonating government entities. Conduct regular threat hunting focused on DLL sideloading and living-off-the-land binaries. Enhance user awareness training to recognize spear-phishing attempts involving PDFs and Excel files. Employ multi-factor authentication and credential hygiene to limit credential dumping impact. Maintain up-to-date threat intelligence feeds to detect indicators of compromise related to SloppyLemming. Incident response teams should prepare for stealthy, persistent intrusions and establish rapid containment protocols. Collaboration with regional CERTs and international partners is advised to share intelligence and coordinate defenses.
Affected Countries
Pakistan, Bangladesh, India
Indicators of Compromise
- hash: 753bb1b5d8b879f478babb21ed4d9696
- hash: 76195b41d2e0c8008c23e77363a7455a
- hash: 7bec405eafc16a6f65d9a0bf7d30cec2
- hash: 7c9642f73e6acb9f95af7db6bd3461a4
- hash: 7faf7a4f5b7f0d6b2e1d9f7957b30640
- hash: 86c3d19dcfb5775a4895832fad052d17
- hash: 97d4cf28319ce4556b87e1e3105287f8
- hash: 9a95078a7a5f1045c61fe95ab308ec3f
- hash: a0345cd01e10d6a2860cc3aa712d3bc5
- hash: ac0623ac3349356060f8f37838ec332b
- hash: f310ee836f88cc43d3939f8a88b20495
- hash: 0e38a7039db2350982ae174778f34303bf405306
- hash: 87fbf997ab96dd4129e008119a3853de2127fbfb
- hash: 8a3b2c21808d5936e5583bb9a8a0191dfbeccbf9
- hash: 9315cca5f6bf475776e9e0bd6b248c374d0ec43e
- hash: 9b1e51e383d086d0ccc2a9366eae80cbcff0c2a5
- hash: a9877fd32c74a668d569234a2a7b3476c5cfe7c6
- hash: b4ff5f83dbec21a3089ae98ebeab55ab3ec8e6b3
- hash: c5171b00bfe40113f4e99cab21e71f955c397d7e
- hash: d4141e449a59298d073cdad32d8120979541a610
- hash: fd3b37622ed4187c869c8427391c4f265a9ae1be
- hash: ff9473d2b0dfe7cd0cff33ce7e83bc2a243c6aea
- hash: 1946315d645d9a8c5114759b350ec4f85dba5f9ee4a63d74437d7a068bff7752
- hash: 1f79f88e97e60bc431ab641ccbbfb09e9d2633d258d3d4bc8b0cb5b9adbc9a4a
- hash: 3269829b50da5b3c4120a103ef72b09a8bbbf258ab3086ca24b2aa24dc00039b
- hash: 3dbf64da37616acbe16bc6bd06a320fed416c4c8ec37a04f811a32389af3d46c
- hash: 4f1628821c13cc27fd4134301cc93a1ad32b2a3f7066c3d90f7ba89e02180754
- hash: 67c341e187ddfcd5a4a7df8743ae82e72db1e5c3747d5c4e185d99f54182f093
- hash: 6ea8fd10725676c886692d3acda9782e044c9f3988276360c87559dcaf1a3123
- hash: 7a34070f98bd129764f053d8003b402975f73e85da87eebdfcc718ac7c8bb0bb
- hash: 7e16fc7603e450b28f06e55748ef65204f8685b0f75e963da997192fdec5f96e
- hash: 81d1a62c00724c1dfbc05a79ac4ae921c459350a2a4a93366c0842fadc40b011
- hash: 87822f0b579c6c123c72971ee524a2d977ba4f02027f32d57a533d8f123183c3
- hash: 8faeea306a331d86ce1acb92c8028b4322efbd11a971379ba81a6b769ff5ac4b
- hash: 9dca24630c06463a01ca6d38b73987589bbe68650b0ff893770eab9ff6ec581a
- hash: bb83cd7ebe75cf62f06859ab2166a35a16cac924f874109b78dd5c4b653d6d44
- hash: c4cea4147719c3abe7eb6c7c7e3420480361773b602d4270af0a607d29f8771f
- hash: c57baa17321257ea1915ba0336a89f63975e6ed612a89c9888be7067222bef38
- hash: c603e7a1018f7b3a168404bcf2f709950c4e29e0596c78823647baaadaf317c7
- hash: d071ea65ea30df38623afe959ccc142f14dc4659dce21c2d7195e31245ee2df1
- hash: f46dd8154f963a8d49c4503bcfb93caf6551f4c845377c95fdde52ce9ca9798b
- hash: ac53c9e43d93a4d0c30d5ac1155e5513d4428035
- hash: fe9954252d97e6b62e3c23c9d6a458a306a93ee8
SloppyLemming Deploys BurrowShell and Rust-Based RAT to Target Pakistan and Bangladesh
Description
An extensive cyber espionage campaign conducted by SloppyLemming, an India-nexus threat actor, targeted government entities and critical infrastructure in Pakistan and Bangladesh from January 2025 to January 2026. The campaign used two attack vectors: PDF lures with ClickOnce execution chains and macro-enabled Excel documents. It deployed a custom x64 shellcode implant named BurrowShell and a Rust-based keylogger. The attackers extensively abused Cloudflare Workers for C2 and payload delivery, registering 112 domains impersonating government entities. The campaign focused on nuclear, defense, telecommunications, energy, and financial sectors, aligning with regional strategic competition in South Asia.
AI-Powered Analysis
Technical Analysis
The SloppyLemming threat actor, linked to India, executed a sophisticated cyber espionage campaign from January 2025 to January 2026 targeting Pakistan and Bangladesh. The attackers employed social engineering via PDF documents with ClickOnce execution chains and macro-enabled Excel files to gain initial access. Upon execution, they deployed BurrowShell, a custom 64-bit shellcode implant designed for stealth and persistence, alongside a Rust-based Remote Access Trojan (RAT) functioning as a keylogger. The campaign heavily abused Cloudflare Workers, a serverless platform, to host command and control infrastructure and deliver payloads, complicating detection and takedown efforts. Over 112 domains were registered, mimicking government entities to increase lure credibility. The campaign targeted critical sectors such as nuclear facilities, defense organizations, telecommunications providers, energy companies, and financial institutions, aligning with regional strategic competition. Techniques observed include DLL sideloading for code execution, credential dumping, use of living-off-the-land binaries, and evasion tactics to avoid detection. Despite the advanced tooling and infrastructure, exploitation required user interaction through opening malicious documents. No public exploits or patches are associated with this campaign, indicating a custom, targeted operation rather than widespread automated exploitation.
Potential Impact
This campaign poses a significant threat to the confidentiality and integrity of sensitive government and critical infrastructure data in Pakistan and Bangladesh. Successful compromise could lead to theft of classified information, disruption of critical services, and undermining of national security. The use of advanced malware and stealthy C2 infrastructure increases the difficulty of detection and response, potentially allowing prolonged espionage activity. The targeting of nuclear, defense, and telecommunications sectors could have cascading effects on regional stability and security. Financial sector intrusions may result in economic espionage or fraud. Organizations affected may face operational disruptions, reputational damage, and increased costs for incident response and remediation. The geopolitical context suggests potential escalation of cyber conflicts in South Asia, with broader implications for regional cybersecurity postures.
Mitigation Recommendations
Organizations in the targeted sectors should implement strict email and document handling policies, including disabling macros by default and blocking ClickOnce execution where possible. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying shellcode injection and unusual Rust-based process behaviors. Monitor and restrict the use of Cloudflare Workers and other serverless platforms for C2 traffic, employing network anomaly detection and DNS filtering to block suspicious domains, especially those impersonating government entities. Conduct regular threat hunting focused on DLL sideloading and living-off-the-land binaries. Enhance user awareness training to recognize spear-phishing attempts involving PDFs and Excel files. Employ multi-factor authentication and credential hygiene to limit credential dumping impact. Maintain up-to-date threat intelligence feeds to detect indicators of compromise related to SloppyLemming. Incident response teams should prepare for stealthy, persistent intrusions and establish rapid containment protocols. Collaboration with regional CERTs and international partners is advised to share intelligence and coordinate defenses.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://arcticwolf.com/resources/blog/sloppylemming-deploys-burrowshell-and-rust-based-rat-to-target-pakistan-and-bangladesh/"]
- Adversary
- SloppyLemming
- Pulse Id
- 69a6c1d2775c55bd8367e527
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash753bb1b5d8b879f478babb21ed4d9696 | — | |
hash76195b41d2e0c8008c23e77363a7455a | — | |
hash7bec405eafc16a6f65d9a0bf7d30cec2 | — | |
hash7c9642f73e6acb9f95af7db6bd3461a4 | — | |
hash7faf7a4f5b7f0d6b2e1d9f7957b30640 | — | |
hash86c3d19dcfb5775a4895832fad052d17 | — | |
hash97d4cf28319ce4556b87e1e3105287f8 | — | |
hash9a95078a7a5f1045c61fe95ab308ec3f | — | |
hasha0345cd01e10d6a2860cc3aa712d3bc5 | — | |
hashac0623ac3349356060f8f37838ec332b | — | |
hashf310ee836f88cc43d3939f8a88b20495 | — | |
hash0e38a7039db2350982ae174778f34303bf405306 | — | |
hash87fbf997ab96dd4129e008119a3853de2127fbfb | — | |
hash8a3b2c21808d5936e5583bb9a8a0191dfbeccbf9 | — | |
hash9315cca5f6bf475776e9e0bd6b248c374d0ec43e | — | |
hash9b1e51e383d086d0ccc2a9366eae80cbcff0c2a5 | — | |
hasha9877fd32c74a668d569234a2a7b3476c5cfe7c6 | — | |
hashb4ff5f83dbec21a3089ae98ebeab55ab3ec8e6b3 | — | |
hashc5171b00bfe40113f4e99cab21e71f955c397d7e | — | |
hashd4141e449a59298d073cdad32d8120979541a610 | — | |
hashfd3b37622ed4187c869c8427391c4f265a9ae1be | — | |
hashff9473d2b0dfe7cd0cff33ce7e83bc2a243c6aea | — | |
hash1946315d645d9a8c5114759b350ec4f85dba5f9ee4a63d74437d7a068bff7752 | — | |
hash1f79f88e97e60bc431ab641ccbbfb09e9d2633d258d3d4bc8b0cb5b9adbc9a4a | — | |
hash3269829b50da5b3c4120a103ef72b09a8bbbf258ab3086ca24b2aa24dc00039b | — | |
hash3dbf64da37616acbe16bc6bd06a320fed416c4c8ec37a04f811a32389af3d46c | — | |
hash4f1628821c13cc27fd4134301cc93a1ad32b2a3f7066c3d90f7ba89e02180754 | — | |
hash67c341e187ddfcd5a4a7df8743ae82e72db1e5c3747d5c4e185d99f54182f093 | — | |
hash6ea8fd10725676c886692d3acda9782e044c9f3988276360c87559dcaf1a3123 | — | |
hash7a34070f98bd129764f053d8003b402975f73e85da87eebdfcc718ac7c8bb0bb | — | |
hash7e16fc7603e450b28f06e55748ef65204f8685b0f75e963da997192fdec5f96e | — | |
hash81d1a62c00724c1dfbc05a79ac4ae921c459350a2a4a93366c0842fadc40b011 | — | |
hash87822f0b579c6c123c72971ee524a2d977ba4f02027f32d57a533d8f123183c3 | — | |
hash8faeea306a331d86ce1acb92c8028b4322efbd11a971379ba81a6b769ff5ac4b | — | |
hash9dca24630c06463a01ca6d38b73987589bbe68650b0ff893770eab9ff6ec581a | — | |
hashbb83cd7ebe75cf62f06859ab2166a35a16cac924f874109b78dd5c4b653d6d44 | — | |
hashc4cea4147719c3abe7eb6c7c7e3420480361773b602d4270af0a607d29f8771f | — | |
hashc57baa17321257ea1915ba0336a89f63975e6ed612a89c9888be7067222bef38 | — | |
hashc603e7a1018f7b3a168404bcf2f709950c4e29e0596c78823647baaadaf317c7 | — | |
hashd071ea65ea30df38623afe959ccc142f14dc4659dce21c2d7195e31245ee2df1 | — | |
hashf46dd8154f963a8d49c4503bcfb93caf6551f4c845377c95fdde52ce9ca9798b | — | |
hashac53c9e43d93a4d0c30d5ac1155e5513d4428035 | — | |
hashfe9954252d97e6b62e3c23c9d6a458a306a93ee8 | — |
Threat ID: 69a71422d1a09e29cb5de9b7
Added to database: 3/3/2026, 5:02:26 PM
Last enriched: 3/3/2026, 5:18:12 PM
Last updated: 3/4/2026, 7:20:13 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-03-03
MediumDust Specter APT Targets Government Officials in Iraq
MediumFunnull Resurfaces: Exposing RingH23 Arsenal and MacCMS Supply Chain Attacks
MediumRedAlert Trojan Campaign: Fake Emergency Alert App Spread via SMS Spoofing Israeli Home Front Command
MediumThreat Brief: March 2026 Escalation of Cyber Risk Related to Iran
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.