Cyber Threat Brief — April 2 2026

⚠️ This report is AI-generated. Always validate findings.

1. Chrome Dawn WebGPU Use-After-Free Zero-Day — CVE-2026-5281

TL;DR: Google’s 4th actively exploited Chrome zero-day of 2026 is a UAF in the Dawn WebGPU layer allowing code execution via crafted HTML. CISA KEV added April 1; patch to 146.0.7680.178+ immediately.

What’s New:

  • Use-after-free in Dawn (WebGPU abstraction layer translating API calls to Vulkan/Metal/Direct3D) enables code execution from a compromised renderer via crafted HTML page
  • Reported by pseudonymous researcher 86ac1f1587b71893ed2ad792cd7dde32 (same reporter found CVE-2026-4675 heap buffer overflow in WebGL and CVE-2026-4676 UAF in Dawn, both patched March 23)
  • CISA KEV added April 1, 2026 — federal deadline April 15, 2026
  • Google confirms ITW exploitation; no attribution or target details released
  • Fixed in Chrome 146.0.7680.177 (Linux) / 146.0.7680.177/.178 (Windows/Mac)

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
Chrome < 146.0.7680.178Vulnerable versionT1203EDR software inventory, SCCMQuery fleet for unpatched Chrome; force-update via GPO/MDM
Crafted HTML page (WebGPU API calls)Exploit deliveryT1189Proxy logs, browser telemetryMonitor for anomalous WebGPU shader/compute workloads in browser telemetry
Renderer process spawning child processesPost-exploit behaviorT1055Sysmon EID 1, EDRAlert on chrome.exe renderer spawning unexpected child processes (cmd, powershell, wscript)
dawn.node / GPU process anomaliesExploit indicatorT1203Chrome crash reports, EDRReview Chrome GPU process crashes for UAF signatures

Detection

SourceRuleGap
Splunk ESCUNone specificNeed: Chrome version compliance dashboard; anomalous browser child process rule
ElasticSuspicious Browser Child Process (macOS) — partialGap: No Windows/Linux equivalent; no WebGPU-specific telemetry rule
Sigmaproc_creation_win_browsers_suspicious_child_process.yml (partial)Gap: Does not differentiate renderer vs broker process lineage

Sources: Google Chrome Releases · BleepingComputer · SecurityWeek · Security Affairs

2. UAC-0255 AGEWHEEZE RAT — CERT-UA Impersonation Campaign

TL;DR: UAC-0255 sent ~1M phishing emails impersonating CERT-UA on March 26-27, delivering a Go-based RAT via password-protected ZIP from Files.fm. C2 at 54.36.237.92:8443 (OVH, WebSocket). CERT-UA assessed the campaign as largely unsuccessful.

What’s New:

  • Emails from incidents@cert-ua[.]tech urged recipients to install “specialized security software” (CERT_UA_protection_tool.zip)
  • ZIP hosted on Files.fm, password-protected; extracts Go-based AGEWHEEZE RAT with screen streaming, command execution, mouse/keyboard emulation, clipboard access, process/service management
  • C2: WebSocket listener at 54.36.237.92:8443 (OVH) with self-signed certificate
  • Persistence: scheduled tasks SvcHelper and CoreService; registry Run keys
  • Targets: Ukrainian state organizations, medical centers, security companies, educational institutions, financial institutions, software development companies
  • CERT-UA assessment: attack largely unsuccessful — only several infected personal devices at educational institutions confirmed

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
incidents@cert-ua[.]techPhishing senderT1566.001Email gatewayBlock sender domain cert-ua[.]tech
cert-ua[.]techPhishing domainT1566.001DNS, proxyBlock domain
54.36.237.92C2 IP (OVH)T1071.001Firewall, NDR, proxyBlock and hunt in netflow
Port 8443 (WebSocket)C2 channelT1071.001Firewall, NDRAlert on outbound WebSocket to OVH ranges on 8443
CERT_UA_protection_tool.zipPayload filenameT1204.002Email gateway, EDRBlock/alert on filename in email attachments and downloads
Scheduled task SvcHelperPersistenceT1053.005Sysmon EID 1, Windows Event 4698Hunt for task creation with this name
Scheduled task CoreServicePersistenceT1053.005Sysmon EID 1, Windows Event 4698Hunt for task creation with this name
%APPDATA% execution pathExecution locationT1204.002Sysmon EID 1, EDRAlert on unsigned binaries executing from %APPDATA%

Detection

SourceRuleGap
Splunk ESCUScheduled Task Created Via Command Line (generic)Need: AGEWHEEZE-specific task name correlation (SvcHelper/CoreService)
ElasticSuspicious Scheduled Task Created (generic)Gap: No AGEWHEEZE IOC-specific rule; no Go-RAT WebSocket C2 pattern
Sigmaschtasks_creation_via_command_line.yml (generic)Gap: Need rule for Go binary executing from %APPDATA% with WebSocket C2

Sources: The Hacker News · SOC Prime · CERT-UA


Status Updates

  • CVE-2026-3055 (Citrix NetScaler): CISA KEV federal deadline is today, April 2. Active exploitation ongoing via SAMLRequest to /saml/login and NSC_TASS cookie memory leak. Metasploit module available. Original brief.
  • CVE-2026-4681 (PTC Windchill): No patch still available. German police physically warning organizations. Imminent exploitation threat persists. Original brief.
  • CVE-2025-53521 (F5 BIG-IP APM): UNC5221 BRICKSTORM exploitation ongoing. Federal deadline passed March 30. No new artifacts. Original brief.
  • CVE-2026-20131 (Cisco FMC): Interlock ransomware exploitation ongoing. No new artifacts. Original brief.
  • UNC1069 axios npm (WAVESHAPER.V2): No new IOCs since initial disclosure. Malicious versions removed. Original brief.