SloppyLemming: Dual Malware Attacks on Pakistan and Bangladesh Governments (2026)

Government systems under siege! A sophisticated cyber threat group has been quietly infiltrating critical infrastructure in Pakistan and Bangladesh, leaving experts scrambling to understand their motives. But here's where it gets controversial: the group, known as SloppyLemming, is employing a dual-malware strategy that blends old tactics with cutting-edge tools, raising questions about their origins and ultimate goals.

According to a recent report by Arctic Wolf, SloppyLemming has been active since at least January 2025, targeting government agencies, energy providers, and telecommunications networks in both countries. Their arsenal includes two distinct malware families: BurrowShell, a versatile backdoor with capabilities like file manipulation and remote shell execution, and a Rust-based keylogger designed to steal sensitive information. The use of Rust, a relatively new language in the malware landscape, signals a concerning evolution in the group's capabilities.

And this is the part most people miss: SloppyLemming isn't just another run-of-the-mill hacking group. They've been linked to previous campaigns targeting South Asian nations, operating under aliases like Outrider Tiger and Fishing Elephant. Their tactics, which include spear-phishing emails with malicious PDFs and Excel documents, demonstrate a moderate level of sophistication.

The PDF lures, for instance, contain URLs that redirect victims to seemingly legitimate Microsoft .NET applications. These applications, however, secretly deploy a malicious loader that decrypts and executes BurrowShell. This backdoor disguises its communication with command-and-control servers as routine Windows Update traffic, making detection even more challenging.

The second attack chain relies on Excel macros to install the keylogger, which not only steals keystrokes but also scans networks for vulnerabilities. Further investigation reveals a significant expansion of SloppyLemming's infrastructure, with a staggering 112 Cloudflare Workers domains registered in the past year alone.

Is SloppyLemming a state-sponsored actor engaged in regional espionage, or a criminal group with a more nefarious agenda? The targeting of nuclear regulatory bodies, defense organizations, and financial institutions in Pakistan and Bangladesh certainly raises red flags. Arctic Wolf suggests that the group's dual-payload strategy – combining a stealthy backdoor with a data-stealing keylogger – indicates a calculated approach based on the perceived value of each target.

Interestingly, some of SloppyLemming's techniques, like the use of ClickOnce execution, overlap with those employed by the notorious SideWinder group. This raises questions about potential collaboration or shared resources within the cybercrime underworld.

One thing is clear: SloppyLemming poses a serious threat to critical infrastructure in South Asia. Their evolving tactics and expanding infrastructure demand a coordinated response from cybersecurity experts and government agencies alike.

What do you think? Is SloppyLemming a state-sponsored actor or a criminal enterprise? Share your thoughts in the comments below!

SloppyLemming: Dual Malware Attacks on Pakistan and Bangladesh Governments (2026)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Otha Schamberger

Last Updated:

Views: 6561

Rating: 4.4 / 5 (55 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Otha Schamberger

Birthday: 1999-08-15

Address: Suite 490 606 Hammes Ferry, Carterhaven, IL 62290

Phone: +8557035444877

Job: Forward IT Agent

Hobby: Fishing, Flying, Jewelry making, Digital arts, Sand art, Parkour, tabletop games

Introduction: My name is Otha Schamberger, I am a vast, good, healthy, cheerful, energetic, gorgeous, magnificent person who loves writing and wants to share my knowledge and understanding with you.