Executive Summary
Between January 2025 and January 2026, the threat actor known as SloppyLemming executed a series of cyber-espionage attacks targeting government entities and critical infrastructure in Pakistan and Bangladesh. Utilizing spear-phishing emails with malicious PDF and Excel attachments, the group deployed two distinct malware strains: BurrowShell, a backdoor facilitating file manipulation and network tunneling, and a Rust-based keylogger designed for information theft and network reconnaissance. These sophisticated attacks underscore the evolving tactics of nation-state actors in the region.
The campaign's reliance on advanced techniques, such as disguising command-and-control traffic as legitimate Windows Update communications and exploiting Cloudflare Workers infrastructure, highlights the increasing complexity of cyber threats facing South Asian nations. This incident serves as a critical reminder for organizations to bolster their cybersecurity defenses against state-sponsored attacks.
Why This Matters Now
The SloppyLemming campaign exemplifies the escalating sophistication of cyber-espionage activities targeting critical infrastructure in South Asia. Organizations must prioritize advanced threat detection and response strategies to mitigate the risks posed by such nation-state actors.
Attack Path Analysis
SloppyLemming initiated attacks by sending spear-phishing emails containing malicious PDF and Excel attachments to government entities in Pakistan and Bangladesh. Upon opening these attachments, victims inadvertently executed malware loaders that installed backdoors and keyloggers, granting attackers initial access. The malware facilitated privilege escalation by exploiting system vulnerabilities, allowing attackers to gain higher-level access. Subsequently, the attackers moved laterally within the network, conducting port scanning and network enumeration to identify and compromise additional systems. Established command and control channels enabled the exfiltration of sensitive data, with communications disguised as legitimate Windows Update traffic. The impact included unauthorized access to critical infrastructure, data theft, and potential disruption of government operations.
Kill Chain Progression
Initial Compromise
Description
Attackers sent spear-phishing emails with malicious PDF and Excel attachments to government entities, leading to the execution of malware loaders upon opening.
MITRE ATT&CK® Techniques
Techniques identified for SEO/filtering; may be expanded with full STIX/TAXII enrichment later.
Spearphishing Attachment
Malicious File
DLL Side-Loading
PowerShell
Obfuscated Files or Information
System Information Discovery
Ingress Tool Transfer
Web Protocols
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – System and Application Security
Control ID: 6.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Identity and Access Management
Control ID: 3.1
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Government Administration
Primary target of SloppyLemming APT using dual malware chains, BurrowShell backdoor, and Rust keylogger compromising Pakistani and Bangladeshi government entities through spear-phishing attacks.
Telecommunications
Critical infrastructure targeted by sophisticated APT employing encrypted C2 traffic, lateral movement capabilities, and network tunneling affecting regional telecommunications operators in South Asia.
Oil/Energy/Solar/Greentech
Energy utilities face advanced persistent threats using zero trust segmentation bypass, egress security evasion, and anomaly detection circumvention targeting Bangladeshi energy infrastructure operators.
Financial Services
Bangladeshi financial institutions threatened by APT deploying keylogger malware, encrypted traffic analysis evasion, and multicloud visibility exploitation for data exfiltration and credential harvesting.
Sources
- SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chainshttps://thehackernews.com/2026/03/sloppylemming-targets-pakistan-and.htmlVerified
- SloppyLemming Deploys BurrowShell and Rust-Based RAT to Target Pakistan and Bangladeshhttps://arcticwolf.com/resources/blog/sloppylemming-deploys-burrowshell-and-rust-based-rat-to-target-pakistan-and-bangladesh/Verified
- SloppyLemming Espionage Campaign Targets Pakistan, Bangladesh with BurrowShell Backdoor and Rust RAThttps://gbhackers.com/sloppylemming-espionage-campaign/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could likely limit the attacker's ability to escalate privileges, move laterally, and exfiltrate data by enforcing strict segmentation and identity-aware policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While Aviatrix CNSF primarily focuses on network-level controls, it could potentially limit the reach of malware by enforcing strict segmentation and identity-aware policies.
Control: Zero Trust Segmentation
Mitigation: Aviatrix Zero Trust Segmentation could likely constrain the attacker's ability to exploit vulnerabilities by enforcing strict access controls and limiting lateral movement.
Control: East-West Traffic Security
Mitigation: Aviatrix East-West Traffic Security could likely limit the attacker's ability to move laterally by enforcing strict segmentation and monitoring internal traffic.
Control: Multicloud Visibility & Control
Mitigation: Aviatrix Multicloud Visibility & Control could likely detect and limit unauthorized command and control communications by providing comprehensive monitoring and control over network traffic.
Control: Egress Security & Policy Enforcement
Mitigation: Aviatrix Egress Security & Policy Enforcement could likely limit data exfiltration by enforcing strict outbound traffic policies and monitoring for unauthorized data transfers.
While Aviatrix CNSF may not prevent initial access, its enforcement of strict segmentation and identity-aware policies could likely limit the scope of unauthorized access and reduce the potential impact on critical infrastructure.
Impact at a Glance
Affected Business Functions
- Government Operations
- Critical Infrastructure Management
- Defense Logistics
- Telecommunications Services
Estimated downtime: 7 days
Estimated loss: $5,000,000
Sensitive government documents, defense logistics data, telecommunications records, and critical infrastructure schematics.
Recommended Actions
Key Takeaways & Next Steps
- • Implement robust email filtering and user training to mitigate spear-phishing attacks.
- • Deploy endpoint detection and response solutions to identify and block malware execution.
- • Utilize network segmentation and access controls to limit lateral movement within the network.
- • Establish comprehensive monitoring and anomaly detection to identify unauthorized command and control communications.
- • Enforce data loss prevention measures to detect and prevent unauthorized data exfiltration.



