Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

SloppyLemming Deploys BurrowShell and Rust-Based RAT to Target Pakistan and Bangladesh

0
Medium
Published: Tue Mar 03 2026 (03/03/2026, 11:11:14 UTC)
Source: AlienVault OTX General

Description

An extensive cyber espionage campaign conducted by SloppyLemming, an India-nexus threat actor, targeted government entities and critical infrastructure in Pakistan and Bangladesh from January 2025 to January 2026. The campaign used two attack vectors: PDF lures with ClickOnce execution chains and macro-enabled Excel documents. It deployed a custom x64 shellcode implant named BurrowShell and a Rust-based keylogger. The attackers extensively abused Cloudflare Workers for C2 and payload delivery, registering 112 domains impersonating government entities. The campaign focused on nuclear, defense, telecommunications, energy, and financial sectors, aligning with regional strategic competition in South Asia.

AI-Powered Analysis

AILast updated: 03/03/2026, 17:18:12 UTC

Technical Analysis

The SloppyLemming threat actor, linked to India, executed a sophisticated cyber espionage campaign from January 2025 to January 2026 targeting Pakistan and Bangladesh. The attackers employed social engineering via PDF documents with ClickOnce execution chains and macro-enabled Excel files to gain initial access. Upon execution, they deployed BurrowShell, a custom 64-bit shellcode implant designed for stealth and persistence, alongside a Rust-based Remote Access Trojan (RAT) functioning as a keylogger. The campaign heavily abused Cloudflare Workers, a serverless platform, to host command and control infrastructure and deliver payloads, complicating detection and takedown efforts. Over 112 domains were registered, mimicking government entities to increase lure credibility. The campaign targeted critical sectors such as nuclear facilities, defense organizations, telecommunications providers, energy companies, and financial institutions, aligning with regional strategic competition. Techniques observed include DLL sideloading for code execution, credential dumping, use of living-off-the-land binaries, and evasion tactics to avoid detection. Despite the advanced tooling and infrastructure, exploitation required user interaction through opening malicious documents. No public exploits or patches are associated with this campaign, indicating a custom, targeted operation rather than widespread automated exploitation.

Potential Impact

This campaign poses a significant threat to the confidentiality and integrity of sensitive government and critical infrastructure data in Pakistan and Bangladesh. Successful compromise could lead to theft of classified information, disruption of critical services, and undermining of national security. The use of advanced malware and stealthy C2 infrastructure increases the difficulty of detection and response, potentially allowing prolonged espionage activity. The targeting of nuclear, defense, and telecommunications sectors could have cascading effects on regional stability and security. Financial sector intrusions may result in economic espionage or fraud. Organizations affected may face operational disruptions, reputational damage, and increased costs for incident response and remediation. The geopolitical context suggests potential escalation of cyber conflicts in South Asia, with broader implications for regional cybersecurity postures.

Mitigation Recommendations

Organizations in the targeted sectors should implement strict email and document handling policies, including disabling macros by default and blocking ClickOnce execution where possible. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying shellcode injection and unusual Rust-based process behaviors. Monitor and restrict the use of Cloudflare Workers and other serverless platforms for C2 traffic, employing network anomaly detection and DNS filtering to block suspicious domains, especially those impersonating government entities. Conduct regular threat hunting focused on DLL sideloading and living-off-the-land binaries. Enhance user awareness training to recognize spear-phishing attempts involving PDFs and Excel files. Employ multi-factor authentication and credential hygiene to limit credential dumping impact. Maintain up-to-date threat intelligence feeds to detect indicators of compromise related to SloppyLemming. Incident response teams should prepare for stealthy, persistent intrusions and establish rapid containment protocols. Collaboration with regional CERTs and international partners is advised to share intelligence and coordinate defenses.

Affected Countries

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://arcticwolf.com/resources/blog/sloppylemming-deploys-burrowshell-and-rust-based-rat-to-target-pakistan-and-bangladesh/"]
Adversary
SloppyLemming
Pulse Id
69a6c1d2775c55bd8367e527
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash753bb1b5d8b879f478babb21ed4d9696
hash76195b41d2e0c8008c23e77363a7455a
hash7bec405eafc16a6f65d9a0bf7d30cec2
hash7c9642f73e6acb9f95af7db6bd3461a4
hash7faf7a4f5b7f0d6b2e1d9f7957b30640
hash86c3d19dcfb5775a4895832fad052d17
hash97d4cf28319ce4556b87e1e3105287f8
hash9a95078a7a5f1045c61fe95ab308ec3f
hasha0345cd01e10d6a2860cc3aa712d3bc5
hashac0623ac3349356060f8f37838ec332b
hashf310ee836f88cc43d3939f8a88b20495
hash0e38a7039db2350982ae174778f34303bf405306
hash87fbf997ab96dd4129e008119a3853de2127fbfb
hash8a3b2c21808d5936e5583bb9a8a0191dfbeccbf9
hash9315cca5f6bf475776e9e0bd6b248c374d0ec43e
hash9b1e51e383d086d0ccc2a9366eae80cbcff0c2a5
hasha9877fd32c74a668d569234a2a7b3476c5cfe7c6
hashb4ff5f83dbec21a3089ae98ebeab55ab3ec8e6b3
hashc5171b00bfe40113f4e99cab21e71f955c397d7e
hashd4141e449a59298d073cdad32d8120979541a610
hashfd3b37622ed4187c869c8427391c4f265a9ae1be
hashff9473d2b0dfe7cd0cff33ce7e83bc2a243c6aea
hash1946315d645d9a8c5114759b350ec4f85dba5f9ee4a63d74437d7a068bff7752
hash1f79f88e97e60bc431ab641ccbbfb09e9d2633d258d3d4bc8b0cb5b9adbc9a4a
hash3269829b50da5b3c4120a103ef72b09a8bbbf258ab3086ca24b2aa24dc00039b
hash3dbf64da37616acbe16bc6bd06a320fed416c4c8ec37a04f811a32389af3d46c
hash4f1628821c13cc27fd4134301cc93a1ad32b2a3f7066c3d90f7ba89e02180754
hash67c341e187ddfcd5a4a7df8743ae82e72db1e5c3747d5c4e185d99f54182f093
hash6ea8fd10725676c886692d3acda9782e044c9f3988276360c87559dcaf1a3123
hash7a34070f98bd129764f053d8003b402975f73e85da87eebdfcc718ac7c8bb0bb
hash7e16fc7603e450b28f06e55748ef65204f8685b0f75e963da997192fdec5f96e
hash81d1a62c00724c1dfbc05a79ac4ae921c459350a2a4a93366c0842fadc40b011
hash87822f0b579c6c123c72971ee524a2d977ba4f02027f32d57a533d8f123183c3
hash8faeea306a331d86ce1acb92c8028b4322efbd11a971379ba81a6b769ff5ac4b
hash9dca24630c06463a01ca6d38b73987589bbe68650b0ff893770eab9ff6ec581a
hashbb83cd7ebe75cf62f06859ab2166a35a16cac924f874109b78dd5c4b653d6d44
hashc4cea4147719c3abe7eb6c7c7e3420480361773b602d4270af0a607d29f8771f
hashc57baa17321257ea1915ba0336a89f63975e6ed612a89c9888be7067222bef38
hashc603e7a1018f7b3a168404bcf2f709950c4e29e0596c78823647baaadaf317c7
hashd071ea65ea30df38623afe959ccc142f14dc4659dce21c2d7195e31245ee2df1
hashf46dd8154f963a8d49c4503bcfb93caf6551f4c845377c95fdde52ce9ca9798b
hashac53c9e43d93a4d0c30d5ac1155e5513d4428035
hashfe9954252d97e6b62e3c23c9d6a458a306a93ee8

Threat ID: 69a71422d1a09e29cb5de9b7

Added to database: 3/3/2026, 5:02:26 PM

Last enriched: 3/3/2026, 5:18:12 PM

Last updated: 3/4/2026, 7:20:13 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses