SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要内容。 文章主要讲的是一个名为SloppyLemming的威胁活动集群,他们最近针对巴基斯坦和孟加拉国的政府机构和关键基础设施发起了新的攻击。攻击时间在2025年1月至2026年1月之间。他们使用了两种不同的攻击链来传播恶意软件,分别是BurrowShell和一个基于Rust的键盘记录器。 Rust编程语言的使用是一个值得注意的变化,因为之前SloppyLemming主要使用传统的编译语言和一些现成的框架。攻击手段包括鱼叉式钓鱼邮件,发送PDF诱饵和带有宏的Excel文件。PDF诱饵包含ClickOnce链接,下载合法的.NET可执行文件和恶意加载器,进而执行恶意软件。 第二条攻击链则利用Excel宏来部署键盘记录器,并进行端口扫描和网络枚举。此外,他们还大量注册了Cloudflare Workers域名,用于基础设施支持。 总结起来,文章描述了SloppyLemming的新一轮攻击活动,包括他们的技术手段、目标以及使用的恶意软件。我需要把这些关键点浓缩到100字以内。 可能的结构是:威胁集群SloppyLemming在2025-2026年间针对南亚国家政府和关键基础设施发动攻击,使用了基于Rust的新恶意软件,并通过钓鱼邮件传播。 检查一下是否控制在100字以内,并且没有使用“文章内容总结”等开头。 </think> 威胁集群SloppyLemming在2025-2026年间针对南亚国家政府和关键基础设施发动攻击,使用基于Rust的新恶意软件并通过钓鱼邮件传播。 2026-3-3 06:53:0 Author: thehackernews.com(查看原文) 阅读量:6 收藏

The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh.

The activity, per Arctic Wolf, took place between January 2025 and January 2026. It involves the use of two distinct attack chains to deliver malware families tracked as BurrowShell and a Rust-based keylogger. 

"The use of the Rust programming language represents a notable evolution in SloppyLemming’s tooling, as prior reporting documented the actor using only traditional compiled languages and borrowed adversary simulation frameworks such as Cobalt Strike, Havoc, and the custom NekroWire RAT," the cybersecurity company said in a report shared with The Hacker News.

SloppyLemming is the moniker assigned to a threat actor that's known to target government, law enforcement, energy, telecommunications, and technology entities in Pakistan, Sri Lanka, Bangladesh, and China since at least 2022. It's also tracked under the names Outrider Tiger and Fishing Elephant.

Prior campaigns mounted by the hacking crew have leveraged malware families like Ares RAT and WarHawk, which are often attributed to SideCopy and SideWinder, respectively.

ArcticWolf's analysis of the latest attacks has uncovered the use of spear-phishing emails to deliver PDF lures and macro-enabled Excel documents to kick-start the infection chains. It described the threat actor as operating with moderate capability.

The PDF decoys contain URLs designed to lead victims to ClickOnce application manifests, which then deploy a legitimate Microsoft .NET runtime executable ("NGenTask.exe") and a malicious loader ("mscorsvc.dll"). The loader is launched using DLL side-loading to decrypt and execute a custom x64 shellcode implant codenamed BurrowShell.

"BurrowShell is a full-featured backdoor providing the threat actor with file system manipulation, screenshot capture capabilities, remote shell execution, and SOCKS proxy capabilities for network tunneling," Arctic Wolf said. "The implant masquerades its command-and-control (C2) traffic as Windows Update service communications and employs RC4 encryption with a 32-character key for payload protection."

The second attack chain employs Excel documents containing malicious macros to drop the keylogger malware, while also incorporating features to conduct port scanning and network enumeration.

Further investigation of the threat actor's infrastructure has identified 112 Cloudflare Workers domains registered during the one-year time period, marking an eight-fold jump from the 13 domains flagged by Cloudflare in September 2024.

The campaign's links to SloppyLemming are based on continued exploitation of Cloudflare Workers infrastructure with government-themed typo-squatting patterns, deployment of the Havoc C2 framework, DLL side-loading techniques, and victimology patterns.

It's worth noting that some aspects of the threat actor's tradecraft, including the use of ClickOnce-enabled execution, overlap with a recent SideWinder campaign documented by Trellix in October 2025.

"In particular, the targeting of Pakistani nuclear regulatory bodies, defense logistics organizations, and telecommunications infrastructure – alongside Bangladeshi energy utilities and financial institutions – aligns with intelligence collection priorities consistent with regional strategic competition in South Asia," Arctic Wolf said.

"The deployment of dual payloads – the in-memory shellcode BurrowShell for C2 and SOCKS proxy operations, and a Rust-based keylogger for information stealing – suggests the threat actor maintains flexibility to deploy appropriate tools based on target value and operational requirements."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/sloppylemming-targets-pakistan-and.html
如有侵权请联系:admin#unsafe.sh