Threat Brief - 2026-02-16

⚠️ This report is AI-generated. Always validate findings.

Threat Brief — Monday, February 16, 2026

Executive Summary

Google patches the first actively exploited Chrome zero-day of 2026 (CVE-2026-2441), a CSS use-after-free flaw enabling sandboxed RCE. Infostealers are evolving to target AI agent configurations—Hudson Rock found real-world compromise of OpenClaw workspaces including private keys and memory files. A new dual-payload campaign abuses Google Groups to deliver Lumma Stealer on Windows and a trojanized “Ninja Browser” on Linux.


1. CVE-2026-2441 — Chrome CSS Use-After-Free Zero-Day

First actively exploited Chrome zero-day of 2026.

Overview

Google released an emergency update Friday (Feb 14) for Chrome 145.0.7632.75/76 to patch CVE-2026-2441, a high-severity (CVSS 8.8) use-after-free vulnerability in the CSS component, specifically in CSSFontFeatureValuesMap which handles font rendering on web pages.

Key Details

FieldValue
CVECVE-2026-2441
CVSS8.8 (High)
TypeUse-After-Free in CSS
ImpactArbitrary code execution inside browser sandbox
DiscoveryShaheen Fazim (Feb 11, 2026)
PatchChrome 145.0.7632.75/76 (Win/Mac), 144.0.7559.75 (Linux)

TTPs & Observables

  • Delivery: Crafted HTML page triggers the UAF during font feature processing
  • Execution: Sandboxed RCE—attacker needs sandbox escape for full system access
  • No public IOCs yet—Google withheld exploitation details

Detection Opportunities

Log SourceDetection Logic
EDR/Browser telemetryChrome process crashes followed by suspicious child processes
NetworkUnusual outbound connections post-crash from Chrome renderer
EndpointMonitor CSSFontFeatureValuesMap crash dumps in Chrome diagnostics

Priority Actions

🔴 Patch immediately — Update to Chrome 145.0.7632.75+ on all endpoints. Affects all Chromium-based browsers (Edge, Brave, Opera, Vivaldi).

Sources


2. Infostealers Now Targeting AI Agent Configurations

Real-world compromise of OpenClaw workspace discovered.

Overview

Hudson Rock identified a live infostealer infection that successfully exfiltrated an entire OpenClaw AI agent configuration environment. This marks a significant evolution from traditional credential theft to comprehensive AI identity compromise.

What Was Stolen

FileContentsImpact
openclaw.jsonGateway token, emailRemote API access
device.jsonPrivate key (PEM)Device impersonation, bypass security checks
soul.mdAgent personality/behavior definitionsUnderstand agent capabilities
memory/*.mdActivity logs, contextUser profiling, sensitive data

TTPs & Observables

  • Target Path: .openclaw/ directory in user home
  • Exfiltration: Standard infostealer file-grabbing routine sweeping for directory names
  • Impact: Full control over victim’s AI agent—impersonation, encrypted log access, paired service access

Detection Opportunities

Log SourceDetection Logic
EDRFile access to ~/.openclaw/device.json or ~/.openclaw/openclaw.json by non-OpenClaw processes
Sysmon (Event 11)File creation in temp directories containing “openclaw” or “device.json”
NetworkExfiltration of .pem or .json files to unknown destinations

Priority Actions

🔴 OpenClaw users: Rotate gateway tokens and device keys if infection suspected. Monitor for unauthorized API calls.

⚠️ Detection engineers: Add file access monitoring for AI agent config directories (.openclaw/, .claude/, similar).

Sources


3. Lumma Stealer & Ninja Browser via Google Groups

4,000+ malicious Google Groups weaponized for dual-platform malware delivery.

Overview

CTM360 published a threat report revealing a global campaign abusing Google’s trusted infrastructure. Attackers infiltrate industry-related Google Groups, post legitimate-looking technical discussions, then embed download links for malware disguised as organizational software.

Infection Flow

Windows Target → Lumma Stealer:

  1. Download link in Google Group → URL shortener/Google Docs redirect
  2. Password-protected archive (~950MB padded, actual payload 33MB)
  3. AutoIt-compiled executable reassembles and decrypts payload
  4. Lumma Stealer harvests credentials, cookies, executes shell commands

Linux Target → Ninja Browser:

  1. Redirect based on OS detection
  2. Trojanized Chromium browser with “privacy” marketing
  3. Silent malicious extension install (NinjaBrowserMonetisation)
  4. Scheduled tasks poll C2 for updates, maintain persistence

IOCs

IPs:

  • 152.42.139[.]18
  • 89.111.170[.]100

C2 Domain:

  • healgeni[.]live

Suspicious Domains:

  • ninja-browser[.]com
  • nb-download[.]com
  • nbdownload[.]space

TTPs & Observables

TechniqueObservable
T1566 (Phishing)Google Groups posts with embedded download links
T1027 (Obfuscation)Null-byte padded archives to evade AV size limits
T1059.001 (PowerShell)AutoIt-based payload reconstruction
T1176 (Browser Extensions)NinjaBrowserMonetisation extension with XOR/Base56 obfuscation
T1053 (Scheduled Task)Daily C2 polling tasks for silent updates

Detection Opportunities

Log SourceDetection Logic
Proxy/DNSConnections to healgeni[.]live, ninja-browser domains
EDRAutoIt (*.a3x) execution, oversized ZIP extraction
BrowserNew extension installs without user interaction
Scheduled TasksTasks polling external domains daily

Priority Actions

🟠 Block IOCs at firewall/proxy. Monitor for scheduled task creation pointing to external domains.

Sources


4. DigitStealer macOS — C2 Infrastructure Mapped

Operator OPSEC failures reveal extensive infrastructure cluster.

Overview

Independent research from Cyber and Ramen mapped DigitStealer’s C2 infrastructure through consistent operator patterns. The macOS-targeting infostealer, first reported by Jamf in November 2025, targets 18 cryptocurrency wallets, browser data, and keychain credentials.

Infrastructure Patterns (Pivot Points)

AttributePattern
TLD.com domains exclusively
Hostingab stract ltd ASN (Sweden)
NameserversNjalla (frequently associated with malware)
SSH VersionsOpenSSH_9.6p1 Ubuntu-3ubuntu13.14
TLS CertificatesLet’s Encrypt
Domain ThemesGaming/crypto naming (diamondpickaxeforge, ironswordzombiekiller)
RegistrarTucows

C2 Communication Endpoints

  • /api/credentials — Send stolen credentials
  • /api/grabber — Upload files to C2
  • /api/poll — Persistent backdoor polling (every 10 seconds)
  • /api/log — Data exfiltration

IOCs (Sample)

IPDomain
80.78.30[.]90beetongame[.]com
80.78.25[.]205binance.comtr-katilim[.]com, yourwrongwayz[.]com
80.78.30[.]191tribusadao[.]com
diamondpickaxeforge[.]com
goldenticketsshop[.]com
fixyourallergywithus[.]com

Detection Opportunities

Log SourceDetection Logic
DNSQueries to domains with gaming/crypto naming on Njalla NS
macOS Unified LogsKeychain access by unsigned binaries
NetworkHTTP POST to /api/credentials, /api/poll endpoints
EDRLaunchAgent creation for persistence polling C2 every 10s

Sources


5. UNC6229/Noodlophile — Fake Job Ads Deliver Infostealers

Vietnam-linked group pivots to employment-themed phishing.

Overview

Google Cloud threat research identified UNC6229, a Vietnam-linked group, pivoting from fake AI video platforms to employment-themed phishing. Targets include digital marketing professionals, students, and remote job seekers who download “application forms” or “skills tests” containing RATs or infostealers.

Technical Updates (from Morphisec/Auteqia Labs)

FeatureDetail
Anti-AnalysisBinaries padded with millions of repetitions of Vietnamese insults—crashes AI disassembly tools
Hashingdjb2 rotating algorithm for API resolution
Integrity CheckHalts if tampering/debugger detected
Command FileRC4-encrypted Chingchong.cmd
ObfuscationHeavy XOR string encoding
C2Telegram bots as command-and-control

TTPs & Observables

  • T1566.001 (Spearphishing Attachment): Job application ZIPs
  • T1059.005 (Visual Basic): Multi-stage loaders
  • T1574.002 (DLL Side-Loading): Hijack trusted executables
  • T1567 (Exfiltration Over Web Service): Telegram API for C2/exfil

Detection Opportunities

Log SourceDetection Logic
Email GatewayAttachments with job-themed naming + password-protected archives
EDRDLL sideloading patterns, unsigned DLLs loaded by signed apps
NetworkTelegram API calls (api.telegram.org) from non-Telegram processes
ProcessOversized binaries (padding detection)

Sources


6. Video Conference Phishing — RMM Tool Delivery

Fake Zoom/Teams/Meet invites deliver remote admin tools.

Overview

Netskope Threat Labs identified a campaign using spoofed video conference invitations to deploy Remote Monitoring and Management (RMM) tools. Victims see fake meeting portals with simulated participants “joining” in real-time, then are prompted to install a “mandatory update” that’s actually an RMM payload.

Why It Works

  • RMM tools are often pre-approved in enterprise environments
  • Signature-based controls may not flag legitimate admin software
  • Attackers gain persistent administrative access while evading detection

TTPs & Observables

  • T1566.002 (Spearphishing Link): Spoofed video conferencing URLs
  • T1219 (Remote Access Software): RMM tools for persistence
  • T1204.001 (User Execution): Fake update prompt

Detection Opportunities

Log SourceDetection Logic
Email/ProxyMeeting invite links to non-corporate domains
EDRRMM tool installation outside IT change windows
DNSTyposquat domains for Zoom/Teams/Meet

Priority Actions

🟠 User awareness: Verify meeting links come from expected senders. Don’t install “updates” from meeting portals.

Sources


Notable: The Promptware Kill Chain

Bruce Schneier published a framework for understanding LLM-based attacks as multi-stage malware campaigns. The seven-step “promptware kill chain”:

  1. Initial Access — Prompt injection (direct or indirect via retrieved content)
  2. Privilege Escalation — Jailbreaking safety guardrails
  3. Reconnaissance — Manipulating LLM to reveal connected services/capabilities
  4. Persistence — Embedding in long-term memory or poisoning retrieval databases
  5. Command & Control — Dynamic instruction fetching
  6. Lateral Movement — Spreading to other users/systems via agent actions
  7. Actions on Objective — Data exfiltration, fraud, code execution

Why it matters: As AI agents gain more tool access, this framework helps defenders think about where to break the attack chain.

Read the full paper | Schneier on Security


Priority Actions Summary

PriorityThreatAction
🔴 CriticalCVE-2026-2441 (Chrome)Patch to 145.0.7632.75+ immediately
🔴 CriticalAI Agent Config TheftRotate keys if infection suspected; add monitoring
🟠 HighGoogle Groups CampaignBlock IOCs, monitor for AutoIt/scheduled tasks
🟠 HighDigitStealer (macOS)Hunt for C2 patterns, monitor keychain access
🟡 MediumUNC6229 Job ScamsEmail gateway rules for job-themed password archives
🟡 MediumVideo Conference PhishingUser awareness; monitor RMM tool installs

Generated: 2026-02-16 07:30 PST