Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsAlleged India-Linked Espionage Campaign Targeted Pakistan, Bangladesh, Sri Lanka
Alleged India-Linked Espionage Campaign Targeted Pakistan, Bangladesh, Sri Lanka
GovTechDefenseCybersecurity

Alleged India-Linked Espionage Campaign Targeted Pakistan, Bangladesh, Sri Lanka

•March 2, 2026
0
The Record by Recorded Future
The Record by Recorded Future•Mar 2, 2026

Why It Matters

The campaign demonstrates how regional state‑aligned actors can infiltrate high‑value sectors, raising geopolitical cyber‑risk for South Asian critical infrastructure.

Key Takeaways

  • •SloppyLemming used malicious PDFs and Excel files
  • •Campaign targeted nuclear, energy, and telecom sectors
  • •112 Cloudflare domains mimicked government names
  • •Attack spanned Jan 2025 to Jan 2026
  • •India-linked actor aligns with state intelligence goals

Pulse Analysis

The emergence of SloppyLemming underscores a growing trend of state‑aligned cyber‑espionage in South Asia. While earlier reports from Cloudflare highlighted a 2022‑2024 focus on Pakistan, the latest Arctic Wolf findings reveal an expanded operation that now includes Bangladesh and Sri Lanka. By leveraging cloud‑based domains that appear legitimate, the actors bypass traditional perimeter defenses, illustrating how geopolitical tensions translate into sophisticated digital campaigns aimed at gathering intelligence for national interests.

Technically, the group employed a two‑pronged approach: malicious PDFs delivering the BurrowShell backdoor and Excel spreadsheets embedding keyloggers with reconnaissance capabilities. Both payloads exploit social engineering tactics, displaying a fake "PDF reader is disabled" message to coax victims into enabling malicious macros. Although the attackers demonstrate moderate capability—evident in multi‑stage execution chains and Windows internals knowledge—their operational security lapses, such as exposed directories, betray a less disciplined tradecraft compared with elite APT groups. This blend of skill and sloppiness gives defenders a foothold for attribution and mitigation.

The targeting of nuclear regulators, energy utilities, and telecom providers raises alarm bells for regional stability. Disruption or data exfiltration from these sectors could impair essential services and compromise national security. Incident responders are urged to tighten email filtering, enforce macro restrictions, and monitor for anomalous domain activity linked to the 112 identified Cloudflare hosts. As India‑nexus actors continue to refine their tactics, governments and private operators must adopt a proactive, intelligence‑driven posture to safeguard critical infrastructure against similar incursions.

Alleged India-linked espionage campaign targeted Pakistan, Bangladesh, Sri Lanka

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...