Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities

An advanced threat actor with ties to India has been observed exploiting multiple cloud service providers for credential harvesting, malware delivery, and command-and-control (C2) operations. This cyber espionage group, dubbed SloppyLemming by web infrastructure and security company Cloudflare, is also known under the aliases Outrider Tiger and Fishing Elephant.

SloppyLemming has been active since at least July 2021, targeting a wide range of entities, including government, law enforcement, energy, education, telecommunications, and technology organizations across South and East Asia. Countries affected include Pakistan, Sri Lanka, Bangladesh, China, Nepal, and Indonesia.

Cloud Service Exploitation and Campaign Tactics

Cloudflare reports that SloppyLemming has extensively used Cloudflare Workers since late 2022 to support its espionage operations. Cloudflare Workers allow developers to execute JavaScript in the cloud, but in this case, SloppyLemming leveraged them for malicious purposes, including handling credential logging and exfiltration.

The group employs spear-phishing techniques to initiate its attacks. Victims receive emails designed to create a sense of urgency, compelling them to click on a malicious link under the pretense of needing to complete an essential process. These emails often lead to credential harvesting pages, giving SloppyLemming unauthorized access to the victims' accounts within targeted organizations.

One of the key tools in SloppyLemming's arsenal is a custom-built tool called CloudPhish, which is used to create malicious Cloudflare Workers for logging and exfiltrating credentials. In some cases, the group also captures Google OAuth tokens to gain access to email accounts or cloud-based services.

Malware and Exploits

The malware delivered by SloppyLemming is varied and sophisticated. The group has previously deployed malware like Ares RAT and WarHawk, linking it to known hacking groups such as SideWinder and SideCopy. SideWinder has been associated with Indian origins, while SideCopy is believed to be a Pakistani threat actor.

One infection method used by SloppyLemming involves booby-trapped RAR archives, such as a file named "CamScanner 06-10-2024 15.29.rar," which likely exploits a known WinRAR vulnerability (CVE-2023-38831) to achieve remote code execution. The RAR files contain an executable that stealthily loads a malicious DLL, CRYPTSP.dll, designed to retrieve a remote access trojan (RAT) from Dropbox.

This technique bears similarities to past attacks by the SideCopy group, which used Ares RAT to target Indian government and defense sectors by distributing malicious ZIP archives. These campaigns often exploited the same vulnerabilities to distribute malware.

Targeted Phishing and Sideloading Attacks

SloppyLemming has also used phishing tactics targeting the Punjab Information Technology Board (PITB) in Pakistan. The group created a fake PITB website, redirecting visitors to a page containing an internet shortcut file designed to download and execute a malicious binary. This executable was used to sideload a rogue DLL file, profapi.dll, which communicated with the group’s C2 infrastructure.

Cloudflare Workers as C2 Intermediaries

A significant aspect of SloppyLemming’s strategy is its use of Cloudflare Worker URLs as intermediaries. These URLs relay requests to the actual C2 domains operated by the group, such as aljazeerak[.]online. By using Cloudflare Workers, SloppyLemming adds an extra layer of obfuscation, making it harder to trace the true origin of their C2 infrastructure.

Targeted Sectors and Geopolitical Implications

Cloudflare's analysis reveals that SloppyLemming has focused on entities of critical importance, particularly in Pakistan. The group's targets include Pakistani police departments, law enforcement agencies, and organizations involved in the operation of Pakistan's sole nuclear power facility. This suggests that the group is targeting entities of strategic value, potentially to gather intelligence on Pakistan’s security infrastructure.

In addition to Pakistan, SloppyLemming has targeted government and military organizations in Sri Lanka and Bangladesh, as well as Chinese entities in the energy and academic sectors. This wide range of targets indicates a broad espionage campaign with significant geopolitical implications, especially given the tension in South Asia between rival nations.

Conclusion

SloppyLemming is a complex and persistent threat actor that continues to evolve its tactics to exploit cloud infrastructure, deliver malware, and engage in credential harvesting. Although the group's use of Cloudflare Workers is innovative, their reliance on spear-phishing, malware distribution, and sideloading techniques suggests that they are well-versed in traditional espionage methodologies.

This campaign, which spans multiple countries and critical sectors, underscores the need for heightened cybersecurity vigilance across the region. As cloud service providers become a more integral part of cyber operations, both legitimate and malicious, organizations will need to stay ahead of emerging threats like SloppyLemming and its many aliases.


Similar Articles
Image Description
cyber security CERT-UA Warns of Threat Actors Impersonating Agency to Launch AnyDesk Scams

CERT-UA has issued a warning about cybercriminals impersonating the agency to send fraudulent AnyDesk connection requests under the pretense ...

  • By DragonX Team

  • Updated Jan 22, 2025

An advanced threat actor with ties to India has been observed exploiting multiple cloud service providers for credential harvesting, malware delivery, and command-and-control (C2) operations. This cyber espionage group, dubbed SloppyLemming by web infrastructure and security company Cloudflare, is also known under the aliases Outrider Tiger and Fishing Elephant.

SloppyLemming has been active since at least July 2021, targeting a wide range of entities, including government, law enforcement, energy, education, telecommunications, and technology organizations across South and East Asia. Countries affected include Pakistan, Sri Lanka, Bangladesh, China, Nepal, and Indonesia.

Cloud Service Exploitation and Campaign Tactics

Cloudflare reports that SloppyLemming has extensively used Cloudflare Workers since late 2022 to support its espionage operations. Cloudflare Workers allow developers to execute JavaScript in the cloud, but in this case, SloppyLemming leveraged them for malicious purposes, including handling credential logging and exfiltration.

The group employs spear-phishing techniques to initiate its attacks. Victims receive emails designed to create a sense of urgency, compelling them to click on a malicious link under the pretense of needing to complete an essential process. These emails often lead to credential harvesting pages, giving SloppyLemming unauthorized access to the victims' accounts within targeted organizations.

One of the key tools in SloppyLemming's arsenal is a custom-built tool called CloudPhish, which is used to create malicious Cloudflare Workers for logging and exfiltrating credentials. In some cases, the group also captures Google OAuth tokens to gain access to email accounts or cloud-based services.

Malware and Exploits

The malware delivered by SloppyLemming is varied and sophisticated. The group has previously deployed malware like Ares RAT and WarHawk, linking it to known hacking groups such as SideWinder and SideCopy. SideWinder has been associated with Indian origins, while SideCopy is believed to be a Pakistani threat actor.

One infection method used by SloppyLemming involves booby-trapped RAR archives, such as a file named "CamScanner 06-10-2024 15.29.rar," which likely exploits a known WinRAR vulnerability (CVE-2023-38831) to achieve remote code execution. The RAR files contain an executable that stealthily loads a malicious DLL, CRYPTSP.dll, designed to retrieve a remote access trojan (RAT) from Dropbox.

This technique bears similarities to past attacks by the SideCopy group, which used Ares RAT to target Indian government and defense sectors by distributing malicious ZIP archives. These campaigns often exploited the same vulnerabilities to distribute malware.

Targeted Phishing and Sideloading Attacks

SloppyLemming has also used phishing tactics targeting the Punjab Information Technology Board (PITB) in Pakistan. The group created a fake PITB website, redirecting visitors to a page containing an internet shortcut file designed to download and execute a malicious binary. This executable was used to sideload a rogue DLL file, profapi.dll, which communicated with the group’s C2 infrastructure.

Cloudflare Workers as C2 Intermediaries

A significant aspect of SloppyLemming’s strategy is its use of Cloudflare Worker URLs as intermediaries. These URLs relay requests to the actual C2 domains operated by the group, such as aljazeerak[.]online. By using Cloudflare Workers, SloppyLemming adds an extra layer of obfuscation, making it harder to trace the true origin of their C2 infrastructure.

Targeted Sectors and Geopolitical Implications

Cloudflare's analysis reveals that SloppyLemming has focused on entities of critical importance, particularly in Pakistan. The group's targets include Pakistani police departments, law enforcement agencies, and organizations involved in the operation of Pakistan's sole nuclear power facility. This suggests that the group is targeting entities of strategic value, potentially to gather intelligence on Pakistan’s security infrastructure.

In addition to Pakistan, SloppyLemming has targeted government and military organizations in Sri Lanka and Bangladesh, as well as Chinese entities in the energy and academic sectors. This wide range of targets indicates a broad espionage campaign with significant geopolitical implications, especially given the tension in South Asia between rival nations.

Conclusion

SloppyLemming is a complex and persistent threat actor that continues to evolve its tactics to exploit cloud infrastructure, deliver malware, and engage in credential harvesting. Although the group's use of Cloudflare Workers is innovative, their reliance on spear-phishing, malware distribution, and sideloading techniques suggests that they are well-versed in traditional espionage methodologies.

This campaign, which spans multiple countries and critical sectors, underscores the need for heightened cybersecurity vigilance across the region. As cloud service providers become a more integral part of cyber operations, both legitimate and malicious, organizations will need to stay ahead of emerging threats like SloppyLemming and its many aliases.


Similar Articles
Image Description
ethical hacking New Brazilian-Linked SambaSpy Malware Targets Italian Users via Phishing Emails

The discovery of the SambaSpy malware and recent trends in BBTok and ...

  • By DragonX Team

  • Updated Sep 20, 2024



Latest News and Updates

Latest News

  • Android's New Identity Check Feature Locks Device Settings Outside Trusted Locations

    1

    Posted Date Jan 25, 2025

    Android's New Identity...

    Google has launched a new...
  • DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations

    2

    Posted Date Jan 25, 2025

    DoJ Indicts 5...

    The U.S. Department of Justice...
  • RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations

    3

    Posted Date Jan 25, 2025

    RANsacked: Over 100...

    A group of academics has...
  • Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks

    4

    Posted Date Jan 24, 2025

    Beware: Fake CAPTCHA...

    Cybersecurity researchers are calling attention...
  • Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits

    5

    Posted Date Jan 24, 2025

    Palo Alto Firewalls...

    An exhaustive evaluation of three...
X
DragonX Cookie Policy

At DragonX, we employ cookies on our website to enhance the site, providing the best service and customer experience possible

Category

Necessary (Always active)

These cookies enable essential site features like secure log-in and consent preference adjustments, without storing any personally identifiable data

Functional

This category aids in specific functions such as sharing website content on social media platforms, receiving feedback, and incorporating third-party features

Analytics

Analytical cookies are utilized to comprehend visitor interactions on the website, offering insights into metrics like visitor numbers, bounce rates, and traffic sources

Performance

These cookies help in understanding and analyzing important performance indicators of the website to enhance the user experience

Advertisement

Tailored advertisements are provided to visitors based on previously visited pages, while also evaluating the effectiveness of ad campaigns