[CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw

Report Type
CVE Vulnerability Intelligence Report

Threat Category
Client-Side Remote Code Execution (Pre-Authentication)

Assessment Date
April 02, 2026

Primary Impact Domain
Endpoint Compromise and User Session Exploitation


BLUF

‍ ‍

 CVE-2026-5281 creates immediate breach exposure because an external attacker can execute code on a vulnerable system without authentication, turning internet-reachable services into direct entry points for compromise. The vulnerability originates from unsafe handling of attacker-supplied network input within a reachable service component, allowing crafted requests to alter execution flow and run arbitrary code. Although not currently listed in the CISA Known Exploited Vulnerabilities catalog, the combination of pre-authentication access, remote execution capability, and likely exposure visibility indicates a high probability of near-term weaponization and KEV inclusion. Executive action must focus on identifying externally reachable vulnerable assets, applying emergency patches, restricting access paths, and verifying that exploitation conditions have been eliminated.

‍ ‍

Executive Risk Translation
This vulnerability creates a short operational window where exposed systems can be directly taken over, converting delayed remediation into a likely security incident with financial, operational, and regulatory consequences.

‍ ‍

S3 Why This Matters Now

‍ ‍

·        The vulnerability allows unauthenticated remote interaction that results in code execution, removing the need for phishing, credential theft, or prior compromise.

‍ ‍

·        Internet-reachable systems can be identified and targeted quickly through automated scanning.

‍ ‍

·        Vulnerabilities with this profile are commonly incorporated into exploit tooling shortly after disclosure.

‍ ‍

·        The period before KEV inclusion is when many organizations remain exposed while attackers begin active testing and exploitation.

‍ ‍

·        Acting now preserves a low-cost remediation window before the vulnerability becomes a routine intrusion method.

‍ ‍

S4 Key Judgments

‍ ‍

·        Exploitation risk is high in environments where the affected service is externally reachable and unpatched.

‍ ‍

·        Exposure and attacker accessibility are the primary risk drivers, outweighing static severity scoring.

‍ ‍

·        CVE-2026-5281 functions as a direct initial-access mechanism rather than a secondary or chained vulnerability.

‍ ‍

·        Delayed remediation shifts the organization from preventive posture to incident response conditions.

‍ ‍

·        Lack of confirmed mass exploitation does not materially reduce risk given the exploit conditions.

‍ ‍

S5 Executive Risk Summary

‍ ‍

·        Successful exploitation allows an unauthenticated attacker to gain execution control of the affected host at the start of the intrusion lifecycle.

‍ ‍

·        The compromised host can be used to access internal services, credentials, and trust relationships reachable from that system.

‍ ‍

·        Risk escalates significantly when the affected system is connected to identity infrastructure, sensitive data stores, or operationally critical services.

‍ ‍

·        If exploitation occurs before detection, the compromise can expand beyond the initial host, requiring containment, investigation, and recovery across multiple systems.

‍ ‍

·        This vulnerability represents a preventable initial-access condition that can escalate into a full operational incident if not remediated promptly.

‍ ‍

S6 Executive Cost Summary

‍ ‍

This cost analysis was developed by the CyberDax team using expert judgment and assisted analytical tools to support clarity and consistency.

‍ ‍

For organizations affected by CVE-2026-5281 with confirmed KEV-listed exploitation activity:

‍ ‍

Low Impact Scenario
50,000 to 200,000 USD
Limited endpoint compromise contained quickly, involving a single user, short-duration incident response, endpoint remediation, and minimal operational disruption.

‍ ‍

Moderate Impact Scenario
200,000 to 800,000 USD
Multi-endpoint compromise involving credential exposure risk, expanded incident response scope, user disruption, and localized interruption to business workflows.

‍ ‍

High Impact Scenario
800,000 to 3 million USD
Widespread browser-based compromise across multiple users leading to credential theft, sustained unauthorized access, extended incident response, and operational disruption driven by containment actions, user downtime, and investigative workload.

‍ ‍

S6A Key Cost Drivers

‍ ‍

·        KEV-confirmed exploitation increases likelihood of compromise across exposed user populations

‍ ‍

·        Browser-based initial access enables scalable targeting across enterprise endpoints

‍ ‍

·        Credential theft and session access increase downstream lateral movement potential

‍ ‍

·        Incident response scope driven by number of affected endpoints and user privilege levels

‍ ‍

·        Operational disruption driven by endpoint isolation, user downtime, and investigation duration

‍ ‍

S6B Compliance and Risk Context

‍ ‍

Compliance Exposure Indicator

‍ ‍

·        KEV-listed vulnerabilities indicate active exploitation and may trigger audit scrutiny under vulnerability management, patch management, and incident response control frameworks

‍ ‍

·        Failure to remediate within required timelines may impact compliance with standards such as NIST, ISO 27001, SOC 2, and internal governance requirements

‍ ‍

Risk Register Entry

‍ ‍

Risk Title
Active Exploitation of Chrome Use-After-Free Vulnerability (CVE-2026-5281)

‍ ‍

Risk Description
KEV-confirmed browser vulnerability enables exploitation through user interaction with malicious content, resulting in potential endpoint compromise, credential exposure, and downstream enterprise risk.

‍ ‍

Likelihood
High

‍ ‍

Impact
High

‍ ‍

Risk Rating
Critical

‍ ‍

Mitigation Priority
Immediate patching and endpoint detection enforcement required

‍ ‍

Annualized Risk Exposure

‍ ‍

800,000 to 4 million USD

‍ ‍

·        Elevated likelihood due to active KEV-listed exploitation

‍ ‍

·        Broad attack surface via enterprise browser usage

‍ ‍

·        Potential for repeated exploitation attempts across user population

‍ ‍

·        Impact dependent on effectiveness of endpoint detection and response controls

‍ ‍

S7 Risk Drivers

‍ ‍

·        Pre-authentication exploitability enables direct attacker interaction with the vulnerable service.

‍ ‍

·        The vulnerability delivers immediate code execution capability without requiring exploit chaining.

‍ ‍

·        Compromised hosts can act as access points into internal services and trust relationships.

‍ ‍

·        Systems with privileged roles or broad connectivity increase downstream impact severity.

‍ ‍

·        Delays in remediation increase the probability that attackers reach vulnerable systems first.

‍ ‍

·        Limited visibility into unauthorized execution on exposed services can delay detection.

‍ ‍

S8 Bottom Line for Executives

‍ ‍

·        CVE-2026-5281 must be treated as an active initial-access risk, not a routine patching activity.

‍ ‍

·        Externally reachable vulnerable systems must be remediated or isolated immediately.

‍ ‍

·        Waiting for KEV inclusion or confirmed mass exploitation shifts this from preventable exposure to active incident risk.

‍ ‍

·        Detection efforts should prioritize identifying unauthorized execution behavior on exposed services.

‍ ‍

S9 Board-Level Takeaway

‍ ‍

·        This vulnerability represents a time-sensitive governance issue tied to how quickly the organization reduces externally exposed risk.

‍ ‍

·        Failure to act promptly increases the likelihood of a preventable incident with measurable financial and regulatory consequences.

‍ ‍

·        Board oversight should ensure that remediation timelines, exposure validation, and accountability mechanisms are enforced under real-world threat conditions.

‍ ‍


‍ ‍

S10 Vulnerability Overview

‍ ‍

CVE-2026-5281 is a use-after-free vulnerability in the Dawn graphics component of Google Chrome that enables remote code execution within the browser renderer process when triggered through crafted web content. The flaw results from improper memory lifecycle management, allowing freed objects to be reused in an unsafe manner and enabling attacker-controlled execution flow.

‍ ‍

Exploitation occurs through user interaction with malicious web content and browser execution context, rather than through exposure of a network service. The operational significance is the ability to achieve execution within the browser renderer process through normal browsing activity.

‍ ‍

S11 Affected Systems and Exposure Surface

‍ ‍

·        Systems running Google Chrome versions prior to 146.0.7680.178 across Windows, macOS, and Linux

‍ ‍

·        Endpoints where users access untrusted or attacker-controlled web content through the browser

‍ ‍

·        Environments where browser sessions maintain authenticated access to SaaS platforms, internal applications, or identity services

‍ ‍

·        Privileged user endpoints where browser compromise provides access to administrative or high-impact systems

‍ ‍

·        Systems without enforced browser isolation, sandbox hardening, or restrictive web access controls

‍ ‍

The primary exposure condition is execution of attacker-controlled web content within the browser by a user, enabling trigger of the vulnerable code path.

‍ ‍

S12 Vulnerability Technical Details

‍ ‍

The vulnerability is a use-after-free condition within the Dawn component, where memory associated with an object is freed and subsequently reused in an unsafe manner. An attacker can influence memory allocation patterns through crafted web content, allowing controlled reuse of freed memory and redirection of execution flow.

‍ ‍

Successful exploitation results in code execution within the browser renderer process. The vulnerability provides execution capability within the browser context.

‍ ‍

S13 KEV Status and Patch Availability

‍ ‍

KEV Status
Listed in CISA Known Exploited Vulnerabilities Catalog

‍ ‍

Exploitation Status
Confirmed active exploitation in the wild based on KEV inclusion

‍ ‍

Exploit Maturity
Operationalized and actively used under real-world conditions

‍ ‍

Vendor Fix Availability
Security fixes released by Google Chrome for versions prior to 146.0.7680.177/178

‍ ‍

Patch Availability Status
Available

‍ ‍

Remediation Requirement
Immediate patching required due to confirmed active exploitation

‍ ‍

Tenable / Nessus Validation

‍ ‍

Tenable Coverage Status
Confirmed

‍ ‍

Relevant Plugins

‍ ‍

·        Plugin ID 304473
Google Chrome < 146.0.7680.177 Multiple Vulnerabilities (Windows)

‍ ‍

·        Plugin ID 304472
Google Chrome < 146.0.7680.177 Multiple Vulnerabilities (MacOS)

‍ ‍

Detection Method
Version-based detection of vulnerable Chrome builds below patched release

‍ ‍

Operational Implication
Version-based scanning reliably identifies vulnerable assets but does not indicate exploitation activity

‍ ‍

S14 Sectors / Countries Affected

‍ ‍

Most At-Risk Environments

‍ ‍

·        Organizations where browser sessions are used to access business-critical SaaS platforms, internal applications, or identity systems

‍ ‍

·        User populations with privileged access to administrative functions or sensitive data through browser-based workflows

‍ ‍

·        Environments where compromise of a single endpoint provides access to shared services, identity infrastructure, or downstream systems

‍ ‍

·        High-value operational environments where browser-mediated access is a primary interface to critical systems

‍ ‍

Geographic Exposure

‍ ‍

·        Global exposure across all regions where vulnerable Chrome versions are deployed

‍ ‍

·        Increased practical risk in regions where targeted exploitation of high-value individuals is more prevalent, although no confirmed geographic targeting is established for this CVE

‍ ‍

Analytical Note

‍ ‍

·        Exposure is driven by browser-mediated access to systems and data, not by externally exposed infrastructure

‍ ‍

S15 Adversary Capability Profiling

‍ ‍

·        Likely Actors: Operators capable of developing or deploying browser memory corruption exploits for endpoint access

‍ ‍

·        Skill Requirement: High technical capability required to develop or adapt reliable use-after-free exploitation

‍ ‍

·        Infrastructure Maturity: Ability to deliver exploit payloads through controlled web content, phishing links, or compromised sites

‍ ‍

·        Scalability: Moderate; targeted delivery is common, with broader use possible as exploit code becomes available

‍ ‍

·        Operational Objectives:

‍ ‍

o   Establish execution on user endpoints

‍ ‍

o   Access authenticated browser sessions and associated services

‍ ‍

o   Enable follow-on intrusion activity through additional techniques

‍ ‍

S16 Targeting Probability Assessment

‍ ‍

Highest targeting probability:

‍ ‍

·       Users with privileged access to enterprise systems through browser sessions

‍ ‍

·       Individuals with access to sensitive data, financial systems, or operational platforms

‍ ‍

·       Environments where browser compromise provides immediate access to authenticated services

‍ ‍

Targeting drivers:

‍ ‍

·       Access to authenticated sessions and identity tokens

‍ ‍

·       Ability to pivot from user context into broader organizational access

‍ ‍

·       Value of data and systems accessible through browser activity

‍ ‍

Lower targeting probability:

‍ ‍

·       Environments with strict browser isolation, rapid patch deployment, and limited exposure to untrusted content

‍ ‍


‍ ‍

Targeting is driven by the value of browser-mediated access and user privilege, not infrastructure exposure.

‍ ‍

S17 MITRE ATT&CK Chain Flow Mapping

‍ ‍

T1189 – Drive-by Compromise
Victim accesses or is directed to malicious web content that delivers exploit payloads.

‍ ‍

T1203 – Exploitation for Client Execution
Use-after-free vulnerability is triggered, resulting in execution within the browser renderer process.

‍ ‍

T1105 – Ingress Tool Transfer
Additional payloads may be retrieved to extend attacker capability following initial execution.

‍ ‍

T1078 – Valid Accounts (conditional)
Not observed in currently available reporting; may occur during post-exploitation depending on attacker objectives and target environment.

‍ ‍

S18 Attack Path Narrative (Signal-Aligned Execution Flow)

‍ ‍

The attack begins when a user accesses attacker-controlled web content delivered through a malicious or compromised website. The web content is constructed to trigger the use-after-free condition in the Chrome Dawn component during normal rendering operations.

‍ ‍

As the browser processes the crafted content, memory associated with previously freed objects is reused in an unsafe manner, allowing the attacker to influence memory layout and redirect execution flow. This results in execution of attacker-controlled code within the browser renderer process.

‍ ‍

The execution occurs entirely within the browser context and does not require prior authentication, local access, or interaction with exposed network services. The outcome of this stage is successful establishment of execution capability within the renderer process.

‍ ‍

S19 Attack Chain Risk Amplification Summary

‍ ‍

·        Execution occurs within an authenticated user context, inheriting access available to active browser sessions

‍ ‍

·        Browser sessions often maintain persistent access to SaaS platforms, internal applications, and identity systems

‍ ‍

·        Compromise of privileged user endpoints increases the potential impact due to elevated access scope

‍ ‍

·        Browser-mediated access enables interaction with systems that are not directly exposed to external networks

‍ ‍

·        The attack bypasses traditional perimeter defenses by operating within legitimate user activity pathways

‍ ‍


‍ ‍

S20 Tactics, Techniques, and Procedures

‍ ‍

T1189 – Drive-by Compromise
Attackers deliver exploit content through malicious or compromised web pages that are accessed by the victim.

‍ ‍

T1203 – Exploitation for Client Execution
The use-after-free vulnerability is triggered through crafted content, resulting in execution within the browser renderer process.

‍ ‍

T1105 – Ingress Tool Transfer
Following execution, additional payloads may be retrieved to extend attacker capability within the compromised context.

‍ ‍

T1078 – Valid Accounts (conditional)
Not observed in currently available reporting; may occur during post-exploitation depending on attacker objectives and target environment.

‍ ‍

S20A Adversary Tradecraft Summary

‍ ‍

·        Exploitation is delivered through standard web interaction paths, requiring the victim to process attacker-controlled content within the browser

‍ ‍

·        Attackers leverage memory corruption conditions to gain execution without credential theft or prior access

‍ ‍

·        Execution within the renderer process allows interaction with active browser sessions and accessible resources

‍ ‍

·        Tradecraft focuses on converting browser execution into usable access within the constraints of the browser environment

‍ ‍

·        Further compromise depends on chaining additional techniques beyond the initial renderer-level execution

‍ ‍

S21 Detection Strategy Overview

‍ ‍

Detection of CVE-2026-5281 should center on identifying browser exploitation outcomes rather than attempting to match exploit content directly. Because the vulnerability is a use-after-free in the Dawn component of Chrome and exploitation occurs inside the browser execution path, reliable detection depends on correlating user-driven content interaction with subsequent endpoint and network anomalies.

‍ ‍

The detection strategy should emphasize three linked stages:

‍ ‍

·        Suspicious or attacker-controlled content reaching the user

‍ ‍

·        Browser anomaly following content interaction

‍ ‍

·        Immediate follow-on endpoint or network deviation from normal browsing behavior

‍ ‍

The objective is to detect the transition from content exposure to browser exploitation symptoms to post-browser abnormal activity.

‍ ‍

S22 Primary Detection Signals

‍ ‍

·        Chrome crash, instability, or abnormal termination closely following access to a specific external destination

‍ ‍

·        Endpoint exploit-prevention, memory-corruption, or browser-protection alerts associated with Chrome

‍ ‍

·        Repeated Chrome anomaly events linked to the same destination or content source across multiple users

‍ ‍

·        Browser sessions followed immediately by endpoint behavior inconsistent with baseline activity

‍ ‍

·        Suspicious destination access followed by near-term Chrome anomaly telemetry

‍ ‍

·        Temporal clustering of Chrome anomalies tied to a shared browsing interaction pattern

‍ ‍

These signals reflect observable exploit impact in the browser and endpoint tied to specific content interaction.

‍ ‍

S23 Telemetry Requirements

‍ ‍

Endpoint / EDR Telemetry

‍ ‍

·        Chrome process execution, crash, and abnormal termination telemetry

‍ ‍

·        Exploit-prevention, browser-protection, and memory-corruption detections tied to Chrome

‍ ‍

·        Parent-child process visibility for Chrome and any near-term follow-on execution

‍ ‍

·        Browser-related mitigation, anomaly, or abnormal restart events

‍ ‍

DNS / Web Proxy Telemetry

‍ ‍

·        Destination access associated with suspicious browsing sessions

‍ ‍

·        First-seen or low-reputation domain interaction tied to Chrome activity

‍ ‍

·        Temporal linkage between page access and later endpoint anomaly telemetry

‍ ‍

Email Security Gateway Telemetry

‍ ‍

·        Delivery of links leading to suspicious browsing sessions

‍ ‍

·        Link-click telemetry correlated to later Chrome anomaly or endpoint signals

‍ ‍

·        Campaign clustering where multiple recipients access the same destination and generate related anomaly telemetry

‍ ‍

Detection quality depends on correlation from delivery → interaction → anomaly.

‍ ‍


‍ ‍

S24 Detection Opportunities and Gaps

‍ ‍

Detection Opportunities

‍ ‍

·        Correlating specific destination access with near-term Chrome anomaly telemetry

‍ ‍

·        Elevating exploit-prevention or memory-corruption alerts tied to Chrome following suspicious browsing events

‍ ‍

·        Identifying consistent crash or anomaly sequences associated with the same browsing path

‍ ‍

·        Detecting shared content-to-anomaly patterns across multiple users

‍ ‍

Detection Gaps

‍ ‍

·        No stable exploit-content signature available for direct detection

‍ ‍

·        No confirmed reusable infrastructure set available for IOC-driven coverage

‍ ‍

·        Early-stage exploitation may produce limited telemetry in environments without strong endpoint visibility

‍ ‍

·        Encrypted delivery reduces visibility into exploit content

‍ ‍

The constraint is limited observable exploit detail, not lack of detectability.


S25 Ultra-Tuned Detection Engineering Rules

Suricata

System Build Position

Suricata remains a supporting network detection surface for CVE-2026-5281. It does not directly detect the Chrome/Dawn use-after-free exploit, renderer-process execution, or endpoint-side browser anomaly behavior.

Only network-observable conditions with realistic Suricata telemetry assumptions are retained below.

Rule Name

Unexpected Executable Delivery over Direct HTTP to User Endpoint Networks

Purpose

Identify external delivery of executable content over direct HTTP to user endpoint networks from non-internal destinations to surface possible follow-on payload delivery.

Detection Logic

Alert on HTTP responses delivering Windows executable content types to scoped user endpoint networks.

Telemetry Dependency

·        Suricata HTTP response-header visibility

·        User endpoint network scoping

·        Environment suppression for legitimate software distribution paths

·        Meaningful direct HTTP visibility

Tuning Explanation

This rule is intentionally narrow:

·        Direct HTTP only

·        Executable-focused MIME types only

·        User endpoint networks only

Suppress:

·        Approved software repositories

·        Enterprise software distribution portals

·        Browser and endpoint update infrastructure

·        Internal application delivery systems

Environment Localization Instructions

·        Restrict $HOME_NET to user endpoint subnets only

·        Suppress known repositories, internal portals, approved distribution services, and update paths

·        Do not deploy where HTTP visibility is negligible

·        Do not treat alerts as exploit confirmation

MITRE Mapping

T1105 – Ingress Tool Transfer

Logical Notes

This rule does not detect exploitation. It detects suspicious executable delivery over direct HTTP and is only valuable when correlated with endpoint telemetry.

Rule Regret Check

Deployment caution
Moderate false-positive risk without strong suppression.

Confidence caution
Indicates suspicious delivery, not exploitation.

Coverage value
Moderate as supporting signal.

Execution Validity Status

Conditionally deployable

System-Ready Code

alert http $EXTERNAL_NET any -> $HOME_NET any (
    msg:"CYBERDAX SURICATA Unexpected executable delivery over direct HTTP to user endpoint network";
    flow:to_client,established;
    http.header;
    pcre:"/Content-Type\x3a[ \t]*(application\/x-dosexec|application\/x-msdownload)/Hi";
    classtype:trojan-activity;
    sid:2505281301;
    rev:1;
    metadata:service http, attack_target client, deployment Perimeter, confidence Low, created_at 2026_04_01;
)

Rule Name

Unexpected Archive Delivery over Direct HTTP to User Endpoint Networks

Purpose

Identify external delivery of archive content over direct HTTP to user endpoint networks to surface potential staging or tooling delivery.

Detection Logic

Alert on HTTP responses delivering archive content types.

Telemetry Dependency

·        Suricata HTTP response-header visibility

·        User endpoint network scoping

·        Suppression for legitimate archive delivery

·        Meaningful direct HTTP visibility

Tuning Explanation

Limit deployment to:

·        User endpoint networks

·        Environments with mature suppression

·        Direct HTTP visibility environments

Environment Localization Instructions

·        Restrict $HOME_NET to user endpoints

·        Suppress known benign archive sources

·        Tune MIME scope based on environment

·        Avoid deployment without suppression testing

MITRE Mapping

T1105 – Ingress Tool Transfer

Logical Notes

This rule detects suspicious archive delivery, not exploitation.

Rule Regret Check

Deployment caution
Moderate to high noise without suppression.

Confidence caution
Indicates staging conditions, not compromise.

Coverage value
Low to Moderate supporting signal.

Execution Validity Status

Conditionally deployable

System-Ready Code

alert http $EXTERNAL_NET any -> $HOME_NET any (
    msg:"CYBERDAX SURICATA Unexpected archive delivery over direct HTTP to user endpoint network";
    flow:to_client,established;
    http.header;
    pcre:"/Content-Type\x3a[ \t]*(application\/zip|application\/x-zip-compressed)/Hi";
    classtype:trojan-activity;
    sid:2505281302;
    rev:1;
    metadata:service http, attack_target client, deployment Perimeter, confidence Low, created_at 2026_04_01;
)

SentinelOne

System Build Position

SentinelOne is the primary endpoint detection layer for CVE-2026-5281 because it can detect browser-origin exploitation outcomes and post-browser suspicious execution behavior on-host.

These rules are designed to detect:

·        suspicious Chrome-origin child-process execution

·        suspicious execution originating from user-writable locations

They do not detect the exploit primitive itself and are not CVE-specific signatures.

Rule Name
Chrome Spawning High-Risk Script Host or LOLBin with Suspicious Command-Line Indicators

Deployment Type
STAR

Severity
High

Purpose

Detect high-confidence suspicious execution where Chrome spawns a narrowed set of script hosts or LOLBins and the child command line indicates encoded execution, script execution, or remote content retrieval.

Detection Logic

Trigger only when all of the following are true:

·        Chrome is the parent process

·        Child process is in a narrowed high-risk set

·        Child command line contains suspicious execution indicators

Telemetry Dependency

·        Parent-child process lineage

·        Child process name

·        Child command-line visibility

Tuning Explanation

This rule enforces dual-condition filtering:

·        suspicious process type

·        suspicious command-line intent

Suppress:

·        browser isolation tooling

·        enterprise SSO helpers

·        remote support tools

·        sanctioned automation workflows

Additional caution:
Script-extension indicators such as .js, .jse, .vbs, .vbe, and .hta may require environment-specific suppression.

Environment Localization Instructions

·        Validate Chrome process naming in the tenant

·        Confirm mapping of parent process, child process, and command-line fields

·        Add signer and path exclusions for known-good processes

·        Restrict deployment to user endpoints

Response Action Guidance

·        Immediate triage

·        Review process tree, command line, and signer

·        Pivot to recent downloads and browsing activity

·        Isolate host if encoded execution or remote retrieval is observed

Performance Considerations

·        Moderate cost due to regex

·        Suitable for STAR where command-line telemetry is reliable

·        Do not deploy if command-line telemetry is incomplete

MITRE Mapping

T1203 – Exploitation for Client Execution
T1059 – Command and Scripting Interpreter
T1105 – Ingress Tool Transfer

Execution Validity Status

Template requiring SentinelOne tenant field mapping and telemetry validation before production deployment

Logical Notes

This rule detects post-browser suspicious execution behavior, not the exploit primitive itself.

System-Ready Code

SrcProcName In ContainsCIS ("chrome")
AND TgtProcName IN (
  "powershell.exe",
  "pwsh.exe",
  "wscript.exe",
  "cscript.exe",
  "mshta.exe",
  "rundll32.exe",
  "regsvr32.exe"
)
AND TgtProcCmdLine RegExp "(?i)(encodedcommand|frombase64string|downloadstring|invoke-webrequest|invoke-expression|\\biwr\\b|\\biex\\b|javascript:|vbscript:|scrobj\\.dll|urlcache|\\.js\\b|\\.jse\\b|\\.vbs\\b|\\.vbe\\b|\\.hta\\b)"

Rule Name
Chrome Launching High-Risk Child Process from User-Writable Path

Deployment Type
STAR

Severity
High

Purpose

Detect likely staging or execution where Chrome launches a suspicious child process from user-writable directories.

Detection Logic

Trigger only when all of the following are true:

·        Chrome is the parent process

·        Child process is in a narrowed high-risk set

·        Execution path is within a user-writable directory

Telemetry Dependency

·        Parent-child process lineage

·        Child process name

·        Child process image path

Tuning Explanation

This rule reduces noise by combining:

·        suspicious process type

·        suspicious execution location

Suppress:

·        approved browser-delivered installers

·        enterprise deployment tools

·        internal packaging workflows

·        lab and testing environments

Environment Localization Instructions

·        Validate mapping of process and path fields

·        Adjust path patterns for OS variations

·        Add exclusions for approved deployment paths

·        Restrict to user endpoints

Response Action Guidance

·        Investigate file origin, path, and signer

·        Correlate with Rule 1 activity

·        Escalate if execution is unexplained

·        Isolate if high-risk behavior is confirmed

Performance Considerations

·        Moderate cost due to regex

·        Suitable for STAR where path telemetry is present

·        Do not deploy if path visibility is incomplete

MITRE Mapping

T1203 – Exploitation for Client Execution
T1105 – Ingress Tool Transfer

Execution Validity Status

Template requiring SentinelOne tenant field mapping and telemetry validation before production deployment

Logical Notes

This rule detects suspicious execution location and process combination, not the exploit primitive itself.

System-Ready Code

SrcProcName In ContainsCIS ("chrome")
AND TgtProcName IN (
  "powershell.exe",
  "pwsh.exe",
  "wscript.exe",
  "cscript.exe",
  "mshta.exe",
  "rundll32.exe",
  "regsvr32.exe"
)
AND TgtProcImagePath RegExp "(?i)(\\\\Users\\\\[^\\\\]+\\\\Downloads\\\\|\\\\Users\\\\[^\\\\]+\\\\AppData\\\\Local\\\\Temp\\\\|\\\\Users\\\\[^\\\\]+\\\\AppData\\\\Roaming\\\\|\\\\ProgramData\\\\Temp\\\\)"

SentinelOne Coverage Disposition

Behavior 1 — Chrome exploitation leading to abnormal browser process behavior

·       Coverage Disposition
Detectable after tenant field mapping is confirmed and required telemetry is present

Behavior 2 — Chrome-origin suspicious execution activity

·       Coverage Disposition
Detectable after tenant field mapping is confirmed and required telemetry is present

Behavior 3 — Payload staging and execution following exploitation

·       Coverage Disposition
Detectable after tenant field mapping is confirmed and required telemetry is present

Behavior 4 — Multi-user or campaign-level correlation

·       Coverage Disposition
Hunt Only

SentinelOne Engineering Note

SentinelOne detection rules in this section are provided as deployment-ready templates based on validated behavioral logic. Final production deployment requires tenant-specific validation of Deep Visibility field mappings, confirmation of command-line and process-path telemetry availability, and environment-specific suppression tuning. Detection coverage statements assume successful field mapping and telemetry completeness and should be interpreted as conditional until those validations are completed.

Splunk

System Build Position

Splunk serves as the primary multi-source correlation platform for CVE-2026-5281 detection. Its role is to identify browser-origin exploitation outcomes and follow-on activity by correlating:

·        Chrome parent-child process anomalies

·        suspicious execution behavior

·        execution path context

·        network or DNS interaction patterns

·        cross-host activity patterns

These detections identify post-exploitation behavior chains, not the underlying browser memory corruption exploit itself.

Rule Name
Chrome Spawning High-Risk Script Host or LOLBin with Suspicious Command-Line Indicators

Deployment Type
Correlation Search

Severity
High

Purpose

Detect high-confidence malicious execution where Chrome spawns a script host or LOLBin and the command line indicates encoded execution, script-based payload delivery, or remote retrieval.

Detection Logic

Alert when all conditions are met:

·        Chrome is the parent process

·        Child process is within a high-risk execution set

·        Command line contains execution or retrieval indicators

Telemetry Dependency

·        Endpoint process telemetry

·        Parent-child process lineage

·        Command-line capture

·        CIM or equivalent normalized process fields

Tuning Explanation

Noise is controlled through dual-condition enforcement:

·        process risk

·        command-line intent

Suppress:

·        enterprise SSO tooling

·        browser isolation platforms

·        sanctioned automation workflows

·        approved remote support utilities

Script-extension indicators (.js, .vbs, .hta, etc.) may require environment-specific suppression.

Environment Localization Instructions

·        Validate CIM mapping for process and command-line fields

·        Tune exclusions for known-good tooling

·        Restrict to user endpoints

·        Prioritize high-value users and privileged accounts

Response Action Guidance

·        Immediate triage

·        Review full process tree and command line

·        Pivot to browser activity and download history

·        Validate Chrome version exposure on host

·        Isolate host if execution is high-risk

MITRE Mapping

T1203 – Exploitation for Client Execution
T1059 – Command and Scripting Interpreter
T1105 – Ingress Tool Transfer

Execution Validity Status

Deployable with validated CIM mapping, command-line telemetry, and pre-filtered search optimization before regex evaluation

Logical Notes

Detects post-browser execution behavior, not exploit delivery or memory corruption directly.

System-Ready Code

| tstats summariesonly=t count min(_time) as firstTime max(_time) as lastTime
  values(Processes.parent_process_name) as parent_process
  values(Processes.process_name) as process_name
  values(Processes.process) as process_cmdline
  values(Processes.dest) as dest
  values(Processes.user) as user
  from datamodel=Endpoint.Processes
  where (
    Processes.parent_process_name="chrome.exe"
    OR Processes.parent_process_name="Google Chrome"
  )
  AND Processes.process_name IN ("powershell.exe","pwsh.exe","wscript.exe","cscript.exe","mshta.exe","rundll32.exe","regsvr32.exe")
  by Processes.dest Processes.user Processes.process _time span=5m
| eval cmd=mvjoin(process_cmdline," ")
| search cmd="*encoded*" OR cmd="*base64*" OR cmd="*download*" OR cmd="*invoke*" OR cmd="*javascript:*" OR cmd="*vbscript:*" OR cmd="*scrobj.dll*" OR cmd="*urlcache*" OR cmd="*.js*" OR cmd="*.jse*" OR cmd="*.vbs*" OR cmd="*.vbe*" OR cmd="*.hta*"
| where match(cmd,"(?i)(encodedcommand|frombase64string|downloadstring|invoke-webrequest|invoke-expression|\\biwr\\b|\\biex\\b|javascript:|vbscript:|scrobj\\.dll|urlcache|\\.js\\b|\\.jse\\b|\\.vbs\\b|\\.vbe\\b|\\.hta\\b)")
| convert ctime(firstTime) ctime(lastTime)

Rule Name
Chrome Launching High-Risk Child Process from User-Writable Path

Deployment Type
Correlation Search

Severity
High

Purpose

Detect likely payload staging or execution where Chrome launches a suspicious process from user-controlled directories.

Detection Logic

Alert when all conditions are met:

·        Chrome is the parent process

·        Child process is high-risk

·        Execution path is within user-writable locations

Telemetry Dependency

·        Endpoint process telemetry

·        Parent-child lineage

·        Process path visibility

·        Normalized path fields

Tuning Explanation

Noise reduction through:

·        process filtering

·        path-based execution context

Suppress:

·        approved software installers

·        enterprise deployment systems

·        internal packaging workflows

Environment Localization Instructions

·        Validate process path mapping

·        Adjust regex to OS environment

·        Exclude known deployment paths

·        Limit to user endpoints

Response Action Guidance

·        Investigate file origin and signer

·        Correlate with Rule 1

·        Escalate if execution is unexplained

·        Isolate host if high-risk

MITRE Mapping

T1203 – Exploitation for Client Execution
T1105 – Ingress Tool Transfer

Execution Validity Status

Deployable with validated path telemetry and CIM mapping

Logical Notes

Detects execution context anomalies, not exploit activity itself.

System-Ready Code

| tstats summariesonly=t count min(_time) as firstTime max(_time) as lastTime
  values(Processes.parent_process_name) as parent_process
  values(Processes.process_name) as process_name
  values(Processes.process_path) as process_path
  values(Processes.dest) as dest
  values(Processes.user) as user
  from datamodel=Endpoint.Processes
  where (
    Processes.parent_process_name="chrome.exe"
    OR Processes.parent_process_name="Google Chrome"
  )
  AND Processes.process_name IN ("powershell.exe","pwsh.exe","wscript.exe","cscript.exe","mshta.exe","rundll32.exe","regsvr32.exe")
  by Processes.dest Processes.user Processes.process_path _time span=5m
| eval path=mvjoin(process_path," ")
| where match(path,"(?i)(\\\\Users\\\\[^\\\\]+\\\\Downloads\\\\|\\\\Users\\\\[^\\\\]+\\\\AppData\\\\Local\\\\Temp\\\\|\\\\Users\\\\[^\\\\]+\\\\AppData\\\\Roaming\\\\|\\\\ProgramData\\\\Temp\\\\)")
| convert ctime(firstTime) ctime(lastTime)

Rule Name
Suspicious Web/DNS Interaction Followed by Chrome-Origin Endpoint Execution

Deployment Type
Correlation Search

Severity
High

Purpose

Detect likely exploit chains by correlating suspicious destination interaction with Chrome-origin execution behavior on the same host.

Detection Logic

Alert when:

·        suspicious destination interaction occurs

·        followed by Chrome-origin endpoint anomaly

·        within a defined time window

Telemetry Dependency

·        Proxy or DNS logs

·        Endpoint process telemetry

·        Host identity normalization

·        Suspicious destination dataset

Tuning Explanation

Noise is reduced through:

·        destination filtering

·        time-bounded correlation

·        endpoint confirmation

Suppress:

·        known business destinations

·        update services

·        approved remote workflows

Environment Localization Instructions

·        Replace lookup with validated threat-intel or first-seen datasets

·        Ensure host identity consistency across sources

·        Tune correlation window (default ~15 minutes)

·        Exclude high-volume benign domains

Response Action Guidance

·        High-priority investigation

·        Validate destination and execution chain

·        Correlate user, browser version, and endpoint activity

·        Isolate if both signals are high-confidence

MITRE Mapping

T1189 – Drive-by Compromise
T1203 – Exploitation for Client Execution

Execution Validity Status

Deployable with validated host normalization and destination intelligence

Logical Notes

Detects behavioral exploit chain patterns, not the exploit itself.

System-Ready Code

(
  index=web OR index=dns
  | eval host_id=coalesce(host, src, client_ip)
  | eval destination=coalesce(dest_domain, query, url)
  | lookup suspicious_destinations destination OUTPUT destination as matched_destination
  | where isnotnull(matched_destination)
  | table _time host_id user destination
)
| append [
  search index=endpoint
  | eval host_id=coalesce(host, device_name)
  | eval parent=parent_process_name
  | eval child=process_name
  | eval cmd=process_command_line
  | where parent="chrome.exe"
  | where child IN ("powershell.exe","pwsh.exe","wscript.exe","cscript.exe","mshta.exe","rundll32.exe","regsvr32.exe")
     OR match(cmd,"(?i)(encodedcommand|downloadstring|invoke-webrequest|\\biwr\\b|\\biex\\b)")
  | table _time host_id user child cmd
]
| sort 0 host_id _time
| streamstats current=f last(_time) as prev_time by host_id
| where (_time-prev_time)<=900
| stats min(_time) as firstTime max(_time) as lastTime values(destination) as destination values(child) as process values(cmd) as cmd by host_id
| convert ctime(firstTime) ctime(lastTime)

Splunk Engineering Note

Splunk detections in this section are deployment-ready and designed for production environments using normalized endpoint and network telemetry. Final deployment requires confirmation of CIM field mappings, validation of data model performance, stable host identity correlation across data sources, and tuning of suppression and threat-intelligence datasets. Detection outcomes assume these prerequisites are met

Elastic

System Build Position

Elastic is used to detect Chrome-origin post-exploitation behavior through endpoint telemetry. These rules identify suspicious execution patterns following browser compromise, not the exploit itself.

Rule Name
Chrome Spawning High-Risk Script Host or LOLBin with Suspicious Command-Line Indicators

Deployment Type
Elastic Detection Rule

Severity
High

Purpose

Detect browser-origin execution of high-risk scripting engines or living-off-the-land binaries combined with suspicious command-line indicators indicative of payload staging or execution

Telemetry Dependency

·        process.parent.name

·        process.name

·        process.command_line

Tuning Explanation

This rule combines:

·        browser parent-child process relationships

·        high-risk child processes

·        strong command-line indicators

This reduces noise by requiring both:

·        execution context (browser origin)

·        malicious intent signals (command-line patterns)

Suppress:

·        known administrative scripts

·        developer tooling invoking PowerShell legitimately

·        enterprise-approved automation

MITRE Mapping

T1059 Command and Scripting Interpreter

T1204 User Execution

Environment Localization Instructions

·        Validate ECS mapping for required fields

·        Add signer and path exclusions

·        Restrict to user endpoints

·        Tune for privileged users

Execution Validity Status

Deployment-ready template requiring ECS field validation and confirmed process.command_line population; do not deploy if command-line telemetry is incomplete or inconsistently populated

Logical Notes

Detects post-browser suspicious execution behavior, not the exploit primitive.

System-Ready Code

process where
  process.parent.name in ("chrome.exe", "chrome", "Google Chrome") and
  process.name in ("powershell.exe", "pwsh.exe", "wscript.exe", "cscript.exe", "mshta.exe", "rundll32.exe", "regsvr32.exe") and
  process.command_line regex~ """(?i).*(encodedcommand|frombase64string|downloadstring|invoke-webrequest|invoke-expression|\biwr\b|\biex\b|javascript:|vbscript:|scrobj\.dll|urlcache|\.js\b|\.jse\b|\.vbs\b|\.vbe\b|\.hta\b).*"""

Rule Name
Chrome Launching High-Risk Child Process from User-Writable Path

Deployment Type
Elastic Detection Rule

Severity
High

Purpose

Detect Chrome-origin execution of suspicious processes from user-writable directories such as Downloads, Temp, or Roaming paths.

Telemetry Dependency

·        process.parent.name

·        process.name

·        process.executable

Tuning Explanation

Requires both:

·        high-risk child process

·        user-writable execution path

Suppress:

·        approved installers

·        enterprise deployment tools

·        packaging workflows

·        lab environments

This rule is Windows-focused; build OS-specific variants separately.

Environment Localization Instructions

·        Validate ECS mapping for executable path

·        Adjust path patterns per OS

·        Add exclusions for approved deployment paths

·        Restrict to user endpoints

Execution Validity Status

Deployment-ready template requiring ECS field validation and confirmed process.executable population; do not deploy if executable-path telemetry is incomplete or inconsistently populated

Logical Notes

Detects suspicious execution location and process combination, not the exploit primitive.

System-Ready Code

process where
  process.parent.name in ("chrome.exe", "chrome", "Google Chrome") and
  process.name in ("powershell.exe", "pwsh.exe", "wscript.exe", "cscript.exe", "mshta.exe", "rundll32.exe", "regsvr32.exe") and
  process.executable regex~ """(?i).*(\\Users\\[^\\]+\\Downloads\\|\\Users\\[^\\]+\\AppData\\Local\\Temp\\|\\Users\\[^\\]+\\AppData\\Roaming\\|\\ProgramData\\Temp\\).*"""

Elastic Coverage Disposition

Behavior 1 — Chrome exploitation leading to abnormal browser process behavior

·       Coverage Disposition
Detectable after ECS field normalization, rule deployment, and telemetry validation

Behavior 2 — Chrome-origin suspicious execution activity

·       Coverage Disposition
Detectable after ECS field normalization, rule deployment, and telemetry validation

Behavior 3 — Payload staging and execution following exploitation

·       Coverage Disposition
Detectable after ECS field normalization, rule deployment, and telemetry validation

Behavior 4 — Multi-user or campaign-level correlation

·       Coverage Disposition
Hunt Only

Elastic Engineering Note

Elastic detections are provided as deployment-ready templates based on validated behavioral logic. Production deployment requires ECS field validation, confirmation that process.command_line and process.executable fields are consistently populated, validated across data sources, and environment-specific suppression tuning. Detection coverage is conditional on successful validation and deployment.

QRadar

System Build Position

QRadar operates as a CRE-based correlation and offense-generation platform for detecting Chrome-origin post-exploitation behavior associated with CVE-2026-5281.

Detection is implemented through:

·        reusable building blocks

·        structured CRE rules

·        offense generation tied to endpoint process activity

These detections identify post-browser execution behavior, not the exploit primitive itself.

QRadar Building Block 1

Building Block Name
BB: Chrome Parent Process Context

Purpose

Scope detections to events where Chrome is the parent process.

Telemetry Dependency

·        Endpoint process creation events

·        Parsed parent process field or custom property

Environment Localization Instructions

·        Validate DSM parsing or custom property extraction for parent process

·        Restrict to endpoint log sources

·        Maintain narrow Chrome process scope

Execution Validity Status

Deployment-ready template requiring DSM or custom-property validation

Deployment-Ready Logic

APPLIES TO endpoint process events
WHEN ParentProcessName IN ("chrome.exe", "chrome", "Google Chrome")

QRadar Building Block 2

Building Block Name
BB: High-Risk Browser-Spawned Child Process

Purpose

Identify suspicious child processes rarely associated with legitimate browser execution.

Telemetry Dependency

·        Endpoint process creation events

·        Parsed process name field

Tuning Explanation

Restricted process set:

·        powershell.exe

·        pwsh.exe

·        wscript.exe

·        cscript.exe

·        mshta.exe

·        rundll32.exe

·        regsvr32.exe

Environment Localization Instructions

·        Validate process name parsing

·        Maintain narrow scope

·        Use exclusion building blocks for known-good activity

Execution Validity Status

Deployment-ready template requiring DSM validation

Deployment-Ready Logic

APPLIES TO endpoint process events
WHEN ProcessName IN (powershell.exe, pwsh.exe, wscript.exe, cscript.exe, mshta.exe, rundll32.exe, regsvr32.exe)

QRadar Building Block 3

Building Block Name
BB: Suspicious Command-Line Execution Indicators

Purpose

Identify command-line behavior consistent with script abuse or encoded execution.

Telemetry Dependency

·        Endpoint process creation events

·        Command-line field or custom property

Tuning Explanation

Primary indicators:
· encodedcommand
· frombase64string
· downloadstring
· invoke-webrequest
· invoke-expression
· javascript:
· vbscript:
· scrobj.dll
Optional indicators (enable only after local tuning validation):
· .js
· .jse
· .vbs
· .vbe
· .hta
Short tokens such as iwr and iex are intentionally excluded from the core QRadar building block to reduce noise and parsing ambiguity.

Environment Localization Instructions

·        Validate command-line extraction

·        Enable script-extension indicators only after tuning

·        Apply suppression for sanctioned automation workflows

Execution Validity Status

Deployment-ready template requiring command-line telemetry validation

Deployment-Ready Logic

APPLIES TO endpoint process events
WHEN CommandLine contains suspicious execution indicators

QRadar Building Block 4

Building Block Name
BB: User-Writable Execution Path

Purpose

Identify execution from user-controlled directories.

Telemetry Dependency

·        Endpoint process creation events

·        Process path field

Tuning Explanation

Windows-focused paths:

·        \Users<user>\Downloads\

·        \Users<user>\AppData\Local\Temp\

·        \Users<user>\AppData\Roaming\

·        \ProgramData\Temp\

Environment Localization Instructions

·        Validate process-path parsing

·        Build OS-specific variants if required

·        Exclude approved deployment paths

Execution Validity Status

Deployment-ready template requiring path telemetry validation

Deployment-Ready Logic

APPLIES TO endpoint process events
WHEN ProcessPath matches user-writable directory patterns

QRadar Rule 1

Rule Name
Chrome Spawning High-Risk Script Host with Suspicious Command-Line Indicators

Deployment Type
CRE Rule

Severity
High

Purpose

Generate an offense when Chrome spawns a high-risk process with suspicious command-line execution indicators.

Detection Logic

Trigger when:

·        BB: Chrome Parent Process Context

·        BB: High-Risk Browser-Spawned Child Process

·        BB: Suspicious Command-Line Execution Indicators

·        Event originates from workstation assets

Telemetry Dependency

·        Endpoint process logs

·        Parent process

·        Process name

·        Command line

·        Asset classification

Tuning Explanation

Noise reduction through:

·        building-block modularity

·        workstation scoping

·        command-line intent

Environment Localization Instructions

·        Validate all building blocks prior to rule deployment

·        Use asset groups for workstation filtering

·        Maintain exclusion building blocks

Response Action Guidance

·        Generate offense

·        Increase magnitude for privileged users

·        Investigate process lineage and execution intent

·        Isolate host if malicious behavior is confirmed

Performance Considerations

·        Efficient with building-block reuse

·        Keep parsing logic in custom properties

·        Avoid heavy inline payload matching

MITRE Mapping

T1203 – Exploitation for Client Execution
T1059 – Command and Scripting Interpreter
T1105 – Ingress Tool Transfer

Execution Validity Status

Deployment-ready template requiring DSM normalization and building-block validation

Logical Notes

Detects post-browser suspicious execution behavior, not the exploit primitive.

Deployment-Ready Rule Logic

WHEN
  BB: Chrome Parent Process Context
  AND BB: High-Risk Browser-Spawned Child Process
  AND BB: Suspicious Command-Line Execution Indicators
  AND Asset Type = Workstation
THEN
  Create or contribute to offense
  Set severity High

QRadar Rule 2

Rule Name
Chrome Launching High-Risk Process from User-Writable Directory

Deployment Type
CRE Rule

Severity
High

Purpose

Generate an offense when Chrome launches a high-risk process from a user-writable execution path.

Detection Logic

Trigger when:

·        BB: Chrome Parent Process Context

·        BB: High-Risk Browser-Spawned Child Process

·        BB: User-Writable Execution Path

·        Event originates from workstation assets

Telemetry Dependency

·        Endpoint process logs

·        Parent process

·        Process name

·        Process path

·        Asset classification

Tuning Explanation

Noise reduction through:

·        process + path combination

·        workstation scoping

Environment Localization Instructions

·        Validate process-path parsing

·        Maintain exclusion building blocks

·        Use OS-specific variants if required

Response Action Guidance

·        Generate offense

·        Investigate execution path and file origin

·        Correlate with Rule 1 activity

·        Escalate if behavior is unexplained

Performance Considerations

·        Moderate impact depending on path parsing

·        Prefer reusable building blocks

·        Validate event volume before broad deployment

MITRE Mapping

T1203 – Exploitation for Client Execution
T1105 – Ingress Tool Transfer

Execution Validity Status

Deployment-ready template requiring DSM normalization and path telemetry validation

Logical Notes

Detects suspicious execution context, not the exploit primitive.

Deployment-Ready Rule Logic

WHEN
  BB: Chrome Parent Process Context
  AND BB: High-Risk Browser-Spawned Child Process
  AND BB: User-Writable Execution Path
  AND Asset Type = Workstation
THEN
  Create or contribute to offense
  Set severity High

QRadar Coverage Disposition

Behavior 1 — Chrome exploitation leading to abnormal browser process behavior

·       Coverage Disposition
Detectable after DSM normalization, building-block validation, rule deployment, and telemetry validation

Behavior 2 — Chrome-origin suspicious execution activity

·       Coverage Disposition
Detectable after DSM normalization, building-block validation, rule deployment, and telemetry validation

Behavior 3 — Payload staging and execution following exploitation

·       Coverage Disposition
Detectable after DSM normalization, building-block validation, rule deployment, and telemetry validation

Behavior 4 — Multi-user or campaign-level correlation

·       Coverage Disposition
Hunt Only

QRadar Engineering Note

QRadar detections are provided as deployment-ready templates based on validated behavioral logic. Production deployment requires DSM parsing validation, field normalization for process and command-line data, building-block validation, asset scoping, and environment-specific suppression tuning. Detection coverage is conditional on successful validation and deployment.

Sigma

System Build Position

Sigma provides a portable detection layer for identifying Chrome-origin post-exploitation behavior associated with CVE-2026-5281.

These rules are intended to detect:

·        suspicious Chrome-origin script-host or LOLBin execution

·        suspicious Chrome-origin execution from specific user-writable directories

These detections identify post-browser suspicious execution behavior, not the exploit primitive itself.

Rule Name
Chrome Spawning High-Risk Script Host with Strong Suspicious Command-Line Indicators

Rule Type
Sigma Detection Rule

Severity
High

Purpose

Detect Chrome spawning a narrowed set of script hosts or LOLBins where the command line contains strong indicators of encoded execution, script abuse, or suspicious retrieval behavior.

Telemetry Dependency

·        Process creation events

·        Parent process field

·        Process name field

·        Command-line field

Tuning Explanation

This rule is intentionally hardened to use stronger command-line indicators only. Weaker indicators such as script extensions or short tokens are excluded from the core rule to preserve low-noise behavior.

Suppress:

·        enterprise SSO tooling

·        browser isolation platforms

·        sanctioned automation workflows

·        approved remote support tooling

Environment Localization Instructions

·        Map Sigma fields to backend-specific fields for:

o   ParentImage

o   Image

o   CommandLine

·        Restrict deployment to workstation endpoints

·        Tune exclusions for known-good browser helpers and automation workflows

·        Validate translated backend handling of contains conditions before production enablement

·        Confirm backend treatment of case sensitivity, wildcard handling, and operator translation before production deployment

Execution Validity Status

Deployment-ready template requiring backend field mapping and command-line telemetry validation

Logical Notes

Detects post-browser suspicious execution behavior, not the exploit primitive itself and not CVE-unique exploit content.

Sigma Rule

title: Chrome Spawning High-Risk Script Host with Strong Suspicious Command-Line Indicators
id: 9c1e1c0f-9b4c-4b1f-9b7a-1d2f0a1d4b21
status: test
description: Detects Chrome spawning a high-risk script host or LOLBin with strong command-line indicators associated with encoded execution, script abuse, or suspicious retrieval behavior.
author: CyberDax
logsource:
  category: process_creation
  product: windows

detection:
  selection_parent:
    ParentImage|endswith: '\chrome.exe'

  selection_child:
    Image|endswith:
      - '\powershell.exe'
      - '\pwsh.exe'
      - '\wscript.exe'
      - '\cscript.exe'
      - '\mshta.exe'
      - '\rundll32.exe'
      - '\regsvr32.exe'

  selection_cmd:
    CommandLine|contains:
      - 'encodedcommand'
      - 'frombase64string'
      - 'downloadstring'
      - 'invoke-webrequest'
      - 'invoke-expression'
      - 'javascript:'
      - 'vbscript:'
      - 'scrobj.dll'

  condition: selection_parent and selection_child and selection_cmd

falsepositives:
  - Approved browser isolation tooling
  - Sanctioned SSO or browser helper workflows
  - Approved remote support tooling
  - Browser-launched enterprise automation workflows

fields:
  - ParentImage
  - Image
  - CommandLine

tags:
  - attack.t1203
  - attack.t1059
  - attack.t1105

level: high

Rule Name
Chrome Launching High-Risk Process from Specific User-Writable Path

Rule Type
Sigma Detection Rule

Severity
High

Purpose

Detect Chrome spawning a suspicious process from specific user-writable directories associated with payload staging or follow-on execution.

Telemetry Dependency

·        Process creation events

·        Parent process field

·        Process image path field

Tuning Explanation

This rule reduces noise by requiring both:

·        suspicious child process

·        specific user-writable execution path

The path logic is intentionally restricted to:

·        Downloads

·        AppData\Local\Temp

·        AppData\Roaming

·        ProgramData\Temp

Suppress:

·        approved software installers

·        enterprise deployment tools

·        sanctioned packaging workflows

·        lab and browser-testing environments

Additional caution:

·        this rule is Windows-focused as written

·        build separate OS-specific variants instead of broadening this one

Environment Localization Instructions

·        Map Sigma fields to backend-specific fields for:

o   ParentImage

o   Image

·        Restrict deployment to workstation endpoints

·        Add exclusions for approved deployment paths

·        Validate translated backend handling of path conditions before production enablement

Execution Validity Status

Deployment-ready template requiring backend field mapping and executable-path telemetry validation

Logical Notes

Detects suspicious execution location and process combination, not the exploit primitive itself and not CVE-unique exploit content.

Sigma Rule

title: Chrome Launching High-Risk Process from Specific User-Writable Path
id: 6d2a4e5f-3c1b-4d7e-a7f2-2e5b6c9d1f33
status: test
description: Detects Chrome spawning a high-risk process from specific user-writable directories commonly associated with payload staging or suspicious follow-on execution.
author: CyberDax
logsource:
  category: process_creation
  product: windows

detection:
  selection_parent:
    ParentImage|endswith: '\chrome.exe'

  selection_child:
    Image|endswith:
      - '\powershell.exe'
      - '\pwsh.exe'
      - '\wscript.exe'
      - '\cscript.exe'
      - '\mshta.exe'
      - '\rundll32.exe'
      - '\regsvr32.exe'

  selection_path:
    Image|contains:
      - '\Downloads\'
      - '\AppData\Local\Temp\'
      - '\AppData\Roaming\'
      - '\ProgramData\Temp\'

  condition: selection_parent and selection_child and selection_path

falsepositives:
  - Approved software installers
  - Enterprise deployment tooling
  - Sanctioned packaging workflows
  - Lab or browser-testing systems

fields:
  - ParentImage
  - Image

tags:
  - attack.t1203
  - attack.t1105

level: high

Sigma Coverage Disposition

Behavior 1 — Chrome exploitation leading to abnormal browser process behavior

·       Coverage Disposition
Detectable after backend field mapping, rule deployment, and telemetry validation

Behavior 2 — Chrome-origin suspicious execution activity

·       Coverage Disposition
Detectable after backend field mapping, rule deployment, and telemetry validation

Behavior 3 — Payload staging and execution following exploitation

·       Coverage Disposition
Detectable after backend field mapping, rule deployment, and telemetry validation

Behavior 4 — Multi-user or campaign-level correlation

·       Coverage Disposition
Hunt Only

Sigma Engineering Note

Sigma rules in this section are provided as deployment-ready templates designed for translation across SIEM and EDR platforms. Final deployment requires backend-specific field mapping, validation of process creation telemetry, and environment-specific suppression tuning. Detection coverage is conditional on successful rule translation, field normalization, and telemetry completeness.

YARA

System Build Position

YARA is a file and memory artifact detection layer, not a primary behavioral detection platform for CVE-2026-5281.

For this CVE, YARA should not be used to claim direct detection of the browser exploit primitive or reliable detection of exploitation activity. Its realistic value is limited to identifying suspicious post-browser artifacts such as:

·        HTA or script-based stagers

·        suspicious PowerShell staging content

·        likely follow-on payload or execution-support content recovered from files or memory

These detections identify potential post-exploitation artifacts, not the Dawn use-after-free exploit itself.

YARA Deployment Constraint

These rules are production-grade in logic, but final deployment remains conditional on confirming:

·        scan context

o   file scanning

o   memory scanning

o   sandbox detonation

o   triage repository scanning

·        artifact availability

·        encoding visibility

·        environment-specific false-positive tuning

·        whether detection is expected from on-disk artifacts, in-memory content, or both, as match behavior and operational value differ between file and memory scanning contexts

Until those validations are completed, these rules should be treated as deployment-ready templates pending scanning-context validation.

Rule Name
Suspicious HTA or Script Stager Artifact with Retrieval Object and Execution Context

Deployment Type
YARA File or Memory Rule

Severity
High

Purpose

Identify suspicious HTA or script-stager artifacts that combine script-host execution context, retrieval-object behavior, and execution-oriented logic consistent with likely post-browser follow-on activity.

Detection Logic

Match only when all of the following are present together:

·        script-host or execution-host context

·        retrieval-object or web-request object usage

·        execution-oriented scripting context

This rule is intentionally hardened to avoid matching on generic script content, generic URLs, or ordinary script files alone.

Telemetry Dependency

·        file content visibility or memory scanning capability

·        access to downloaded artifacts, staged files, or captured memory regions

·        YARA scanning integrated into triage, endpoint, sandbox, or repository workflows

Tuning Explanation

This rule reduces noise by requiring co-occurrence of:

·        execution-host context

·        retrieval object usage

·        execution-oriented script logic

It is not intended to match:

·        ordinary JavaScript

·        benign HTA content

·        administrative scripts without staging characteristics

·        content containing only URLs or generic script extensions

Environment Localization Instructions

·        scope scanning to browser download collections, temp artifact repositories, sandbox outputs, quarantined files, or acquired memory artifacts

·        exclude known-good internal admin script repositories

·        validate local handling of HTA, JS, and VBS-style content encodings

·        do not use as a standalone browser-exploit detector

Response Action Guidance

·        review artifact provenance and execution chain

·        correlate with Chrome-origin suspicious process activity

·        escalate if artifact is recovered from browser download paths, temp paths, or memory associated with suspicious endpoint activity

·        treat as supporting evidence of likely post-browser follow-on behavior, not exploit confirmation

Performance Considerations

·        low to moderate depending on scan scope

·        best used on scoped artifact collections and triage sets

·        avoid unrestricted enterprise-wide scanning without source or path controls

MITRE Mapping

T1059 – Command and Scripting Interpreter
T1105 – Ingress Tool Transfer

Execution Validity Status

Deployment-ready template requiring scanning-context validation and local false-positive tuning

Logical Notes

This rule detects suspicious post-browser stager content, not the exploit primitive itself and not CVE-unique exploit content.

System-Ready Code

rule CYBERDAX_Suspicious_HTA_or_Script_Stager_With_Retrieval_Object_And_Execution
{
    meta:
        author = "CyberDax"
        description = "Detects suspicious HTA or script stager content combining execution-host, retrieval-object, and execution-context indicators"
        severity = "high"
        scope = "file_or_memory"
        status = "test"

    strings:
        $host1 = "mshta" ascii nocase
        $host2 = "wscript" ascii nocase
        $host3 = "cscript" ascii nocase
        $host4 = "scrobj.dll" ascii nocase

        $retr1 = "XMLHTTP" ascii nocase
        $retr2 = "WinHttpRequest" ascii nocase
        $retr3 = "MSXML2.XMLHTTP" ascii nocase
        $retr4 = "ADODB.Stream" ascii nocase
        $retr5 = "responseBody" ascii nocase

        $exec1 = "javascript:" ascii nocase
        $exec2 = "vbscript:" ascii nocase
        $exec3 = "CreateObject" ascii nocase
        $exec4 = "GetObject" ascii nocase
        $exec5 = "Run(" ascii nocase

    condition:
        (1 of ($host*)) and
        (2 of ($retr*)) and
        (1 of ($exec*))
}

Rule Name
Suspicious PowerShell Staging Artifact with Encoded Retrieval and Execution Chaining

Deployment Type
YARA File or Memory Rule

Severity
High

Purpose

Identify suspicious PowerShell staging artifacts that combine PowerShell execution context with encoded or decode behavior, retrieval behavior, and execution-chaining logic consistent with likely follow-on activity.

Detection Logic

Match only when all of the following are present together:

·        PowerShell execution context

·        encoded or decoding behavior

·        retrieval behavior

·        execution-chaining behavior

This rule is intentionally stronger than matching on powershell, IEX, or URL strings alone.

Telemetry Dependency

·        file or memory content visibility

·        access to staged scripts, downloaded payloads, temporary files, or captured memory

·        YARA scanning integrated into triage, endpoint, repository, or sandbox workflows

Tuning Explanation

This rule reduces noise by requiring combined evidence of:

·        PowerShell execution context

·        encoded or decode behavior

·        retrieval behavior

·        execution chaining

It should not be used to classify ordinary administrative PowerShell content without surrounding suspicious markers.

Environment Localization Instructions

·        apply primarily to suspicious files, quarantined artifacts, browser download paths, temp collections, or memory captures

·        exclude sanctioned administrative script repositories where appropriate

·        tune string combinations if internal deployment frameworks use overlapping terms

·        do not use as a standalone browser-exploit detector

Response Action Guidance

·        review artifact source and file path

·        correlate with Chrome-origin process execution and user activity

·        escalate if artifact appears in browser download directories, temp locations, or alongside suspicious child-process execution

·        use as supporting evidence for post-browser staging, not exploit confirmation

Performance Considerations

·        low to moderate depending on scan target scope

·        most effective in triage-focused scanning rather than unrestricted enterprise-wide sweeps

·        broad scanning without scoping may increase benign PowerShell matches in administrative environments

MITRE Mapping

T1059 – Command and Scripting Interpreter
T1105 – Ingress Tool Transfer

Execution Validity Status

Deployment-ready template requiring scanning-context validation and local false-positive tuning

Logical Notes

This rule detects suspicious PowerShell staging artifacts, not the exploit primitive itself and not CVE-unique exploit content.

System-Ready Code

rule CYBERDAX_Suspicious_PowerShell_Staging_With_Encoded_Retrieval_And_Execution_Chaining
{
    meta:
        author = "CyberDax"
        description = "Detects suspicious PowerShell staging artifacts combining encoded, retrieval, and execution-chaining behavior"
        severity = "high"
        scope = "file_or_memory"
        status = "test"

    strings:
        $ps1 = "powershell" ascii nocase
        $ps2 = "pwsh" ascii nocase

        $enc1 = "EncodedCommand" ascii nocase
        $enc2 = "FromBase64String" ascii nocase
        $enc3 = "-enc" ascii nocase

        $ret1 = "DownloadString" ascii nocase
        $ret2 = "Invoke-WebRequest" ascii nocase
        $ret3 = "Net.WebClient" ascii nocase
        $ret4 = "DownloadFile" ascii nocase

        $exe1 = "Invoke-Expression" ascii nocase
        $exe2 = "IEX" ascii nocase
        $exe3 = "Start-Process" ascii nocase
        $exe4 = "iex (" ascii nocase

    condition:
        (1 of ($ps*)) and
        (1 of ($enc*)) and
        (1 of ($ret*)) and
        (1 of ($exe*))
}

YARA Coverage Disposition

Behavior 1 — Chrome exploitation leading to abnormal browser process behavior

·       Coverage Disposition
Not Covered

Behavior 2 — Chrome-origin suspicious execution activity

·       Coverage Disposition
Hunt Only

Behavior 3 — Payload staging and execution following exploitation

·       Coverage Disposition
Detectable after scanning scope, artifact availability, rule deployment, and local tuning are validated

Behavior 4 — Multi-user or campaign-level correlation

·       Coverage Disposition
Not Covered

YARA Engineering Note

YARA detections in this section are provided as deployment-ready templates for artifact and memory-content scanning, not for primary behavioral detection of CVE-2026-5281 exploitation. Final production deployment requires validation of scan scope, artifact availability, file or memory visibility, and environment-specific false-positive tuning. Detection coverage statements assume that suspicious files, memory artifacts, or staged content are available for scanning and should be interpreted as conditional until those prerequisites are confirmed.

AWS

System Build Position

AWS is a post-compromise cloud consequence detection layer for CVE-2026-5281. It is not used to detect the browser exploit itself. Its realistic value is in identifying suspicious AWS identity, session, and privilege activity that may follow browser-origin compromise.

These detections are intended to identify:

·        suspicious AWS console sign-in by exposed or high-risk human identities

·        suspicious STS / assumed-role activity by exposed human identities

·        suspicious IAM credential or privilege-affecting actions following browser-compromise context

These detections identify post-compromise cloud control-plane consequences, not the Dawn use-after-free exploit primitive itself.

AWS Deployment Constraint

These rules are production-grade in logic, but final deployment remains conditional on confirming:

·        CloudTrail management-event logging is enabled and retained

·        ConsoleLogin visibility is available

·        IAM and STS event coverage is retained and searchable

·        source IP, region, userIdentity.type, principal ARN / name, and eventName are available in the detection pipeline

·        local enrichment exists for:

o   exposed users

o   high-risk users

o   privileged identities

o   known workload / automation identities

·        historical baselines or reference sets exist for:

o   new source IP detection

o   new region detection

o   newly observed role usage

Until those validations are completed, these rules should be treated as deployment-ready templates pending AWS logging, enrichment, and baseline validation.

Rule Name
Suspicious AWS ConsoleLogin by Exposed or High-Risk Human Identity from New Access Context

Deployment Type
CloudTrail / SIEM Correlation Rule

Severity
High

Purpose

Detect suspicious AWS console access by a human identity that is already high-risk because of browser-compromise context, exposed endpoint posture, or correlated endpoint detections.

Detection Logic

Trigger only when all of the following are true:

·        CloudTrail records eventName = ConsoleLogin

·        userIdentity.type indicates a human-usable identity context, such as:

o   IAMUser

o   FederatedUser

o   selected AssumedRole patterns known to represent human access

·        the identity is in a:

o   high-risk-user set

o   exposed-browser-user set

o   or correlated endpoint-compromise context

·        the sign-in presents at least one deployable suspicious-access condition, such as:

o   source IP not seen for that identity in the last 30 days

o   AWS region not seen for that identity in the last 30 days

o   console access outside approved admin windows for a privileged identity

o   first observed console access for that identity in the baseline period

Telemetry Dependency

·        CloudTrail management events

·        ConsoleLogin visibility

·        userIdentity.type, principal identity, source IP, and region context

·        local identity-risk enrichment

·        local baseline or reference-set capability

Tuning Explanation

This rule is intentionally not a generic “anomalous AWS login” rule. It is designed to fire only when AWS console access is combined with browser-compromise-adjacent identity risk and a deployable access-context deviation.

Suppress:

·        known VPN egress points

·        sanctioned admin jump hosts

·        expected on-call or change-window access

·        normal federated console access patterns for known users

Environment Localization Instructions

·        validate ConsoleLogin coverage in the detection pipeline

·        maintain a human-user-only high-risk / exposed-user reference set

·        explicitly exclude workload identities and automation principals

·        baseline normal source IP and region patterns for privileged human users

·        restrict the rule to identities that legitimately use AWS console access

Response Action Guidance

·        immediately review principal, source IP, region, and timing

·        correlate with endpoint detections on the same user

·        review recent browser-origin suspicious activity tied to that user

·        escalate if the identity is privileged or newly exposed

·        consider session review and containment if corroborating activity exists

Performance Considerations

·        low to moderate

·        most effective with local high-risk-user enrichment and 30-day reference sets

·        avoid deployment as a generic identity-anomaly rule without browser-risk context

MITRE Mapping

T1078 – Valid Accounts
T1539 – Steal Web Session Cookie (conditional downstream context)

Execution Validity Status

Deployment-ready template requiring CloudTrail console-sign-in visibility, identity enrichment, and baseline validation

Logical Notes

This rule detects suspicious AWS console access following possible browser-origin compromise context, not the exploit primitive itself.

Deployment-Ready Rule Logic

WHEN
  CloudTrail EventName = ConsoleLogin
  AND userIdentity.type IN (IAMUser, FederatedUser, approved human AssumedRole patterns)
  AND Identity is in HighRiskUserSet OR ExposedBrowserUserSet
  AND (
    SourceIP is new for identity in last 30 days
    OR AWS region is new for identity in last 30 days
    OR Console access occurs outside approved admin window for privileged identity
    OR Console access is first observed for identity in baseline period
  )
THEN
  Generate high-severity alert

Rule Name
Suspicious STS Role Assumption or Temporary-Credential Use by Exposed Human Identity

Deployment Type
CloudTrail / SIEM Correlation Rule

Severity
High

Purpose

Detect suspicious STS activity by a human identity that is already high-risk because of browser-compromise context or correlated endpoint detections.

Detection Logic

Trigger only when all of the following are true:

·        CloudTrail records eventSource = sts.amazonaws.com

·        eventName is one of:

o   AssumeRole

o   AssumeRoleWithSAML

o   AssumeRoleWithWebIdentity

o   GetSessionToken

·        the identity context represents a human-access pattern rather than automation

·        the identity is in a:

o   high-risk-user set

o   exposed-browser-user set

o   or correlated endpoint-compromise context

·        the STS activity presents at least one deployable suspicious-use condition, such as:

o   role not seen for that identity in the last 30 days

o   cross-account role usage not seen for that identity in the last 30 days

o   source IP or region not seen for that identity in the last 30 days

o   privileged role assumption outside approved operating window

Telemetry Dependency

·        CloudTrail STS events

·        userIdentity.type, principal identity, source IP, region, role / account context

·        local identity-risk enrichment

·        role-usage baseline or reference sets

Tuning Explanation

This rule is intentionally not a generic “AssumeRole is suspicious” detector. It is meant to identify STS activity that is suspicious because of identity risk context and unusual human role use.

Suppress:

·        expected CI/CD roles

·        workload roles

·        normal automation identities

·        sanctioned delegated-admin workflows

Environment Localization Instructions

·        baseline normal role-assumption patterns for human users separately from workloads

·        maintain privileged-role and high-risk-user reference sets

·        exclude automation and service principals from the rule scope

·        validate expected cross-account role assumptions used by humans

Response Action Guidance

·        review principal, assumed role, source IP, region, and follow-on API actions

·        correlate with endpoint/browser-origin detections for the same user

·        escalate when privileged roles are involved or role use is newly observed

·        consider session containment or token review if corroborated

Performance Considerations

·        low to moderate

·        most effective with human-vs-workload identity separation and 30-day role baselines

·        avoid broad deployment without workload-identity exclusions

MITRE Mapping

T1078 – Valid Accounts
T1550 – Use Alternate Authentication Material (conditional identity/session context)

Execution Validity Status

Deployment-ready template requiring CloudTrail STS visibility, identity enrichment, and role baselining

Logical Notes

This rule detects suspicious post-compromise role or token use, not the exploit primitive itself.

Deployment-Ready Rule Logic

WHEN
  CloudTrail EventSource = sts.amazonaws.com
  AND EventName IN (AssumeRole, AssumeRoleWithSAML, AssumeRoleWithWebIdentity, GetSessionToken)
  AND userIdentity.type indicates human-access context
  AND Identity is in HighRiskUserSet OR ExposedBrowserUserSet
  AND (
    Role is new for identity in last 30 days
    OR Cross-account role use is new for identity in last 30 days
    OR SourceIP is new for identity in last 30 days
    OR AWS region is new for identity in last 30 days
    OR Privileged role assumption occurs outside approved window
  )
THEN
  Generate high-severity alert

Rule Name
Sensitive IAM Credential or Privilege-Affecting Action by Exposed Human Identity

Deployment Type
CloudTrail / SIEM Correlation Rule

Severity
Critical

Purpose

Detect post-compromise AWS activity where a high-risk or exposed human identity performs IAM actions that materially increase persistence, privilege, or credential risk.

Detection Logic

Trigger only when all of the following are true:

·        CloudTrail records eventSource = iam.amazonaws.com

·        eventName is one of the curated high-risk IAM actions, such as:

o   CreateAccessKey

o   UpdateAccessKey

o   CreateLoginProfile

o   AttachUserPolicy

o   AttachRolePolicy

o   PutUserPolicy

o   PutRolePolicy

o   UpdateAssumeRolePolicy

o   CreatePolicyVersion

o   SetDefaultPolicyVersion

·        the identity context represents a human-access pattern rather than automation

·        the identity is in a:

o   high-risk-user set

o   exposed-browser-user set

o   or correlated endpoint-compromise context

·        the IAM action is unusual for that principal, such as:

o   first observed use of that action in the last 30 days

o   action outside normal admin window

o   action by a principal not normally performing IAM administration

Telemetry Dependency

·        CloudTrail IAM events

·        curated high-risk IAM action set

·        userIdentity.type, principal identity, source IP, and region context

·        local privileged-user enrichment

·        human-admin baseline or reference sets

Tuning Explanation

This rule should focus on persistence- and privilege-relevant IAM actions only. It should not be deployed as a generic “all IAM changes are suspicious” detector.

Suppress:

·        expected infrastructure automation

·        sanctioned IAM administration windows

·        normal identity-lifecycle workflows

·        expected break-glass or delegated-administration activity

Environment Localization Instructions

·        maintain a curated high-risk IAM action set

·        baseline legitimate human administrative behavior by identity and role

·        separate human-admin from workload-admin behavior

·        enrich with endpoint compromise and exposed-user context

Response Action Guidance

·        immediate high-priority investigation

·        review principal, source IP, action sequence, and follow-on IAM actions

·        correlate with browser-compromise and endpoint detections

·        consider key revocation, session invalidation, and privilege containment if malicious context is supported

Performance Considerations

·        low to moderate

·        best when limited to curated high-risk IAM actions and 30-day baselines

·        avoid broad alerting on all IAM administration without behavior context

MITRE Mapping

T1098 – Account Manipulation
T1078 – Valid Accounts

Execution Validity Status

Deployment-ready template requiring CloudTrail IAM visibility, high-risk action curation, identity enrichment, and human-admin baselining

Logical Notes

This rule detects high-risk post-compromise IAM activity, not the exploit primitive itself.

Deployment-Ready Rule Logic

WHEN
  CloudTrail EventSource = iam.amazonaws.com
  AND EventName IN (
    CreateAccessKey,
    UpdateAccessKey,
    CreateLoginProfile,
    AttachUserPolicy,
    AttachRolePolicy,
    PutUserPolicy,
    PutRolePolicy,
    UpdateAssumeRolePolicy,
    CreatePolicyVersion,
    SetDefaultPolicyVersion
  )
  AND userIdentity.type indicates human-access context
  AND Identity is in HighRiskUserSet OR ExposedBrowserUserSet
  AND (
    Action is first observed for identity in last 30 days
    OR Action occurs outside approved admin window
    OR Identity does not normally perform IAM administration
  )
THEN
  Generate critical alert

AWS Coverage Disposition

Behavior 1 — Chrome exploitation leading to abnormal browser process behavior

·       Coverage Disposition
Not Covered

Behavior 2 — Chrome-origin suspicious execution activity

·       Coverage Disposition
Not Covered

Behavior 3 — Post-compromise identity, token, or cloud-control activity following exploitation

·       Coverage Disposition
Detectable after CloudTrail visibility, identity enrichment, baseline validation, rule deployment, and telemetry validation are completed

Behavior 4 — Multi-user or campaign-level cloud consequence correlation

·       Coverage Disposition
Hunt Only

AWS Engineering Note

AWS detections in this section are provided as deployment-ready templates for post-compromise cloud consequence detection, not for direct detection of CVE-2026-5281 exploitation. Final production deployment requires validation of CloudTrail management-event coverage, ConsoleLogin visibility, IAM / STS event retention, identity enrichment, separation of human and workload identities, and environment-specific baselining for privileged users. Detection coverage statements assume successful logging, enrichment, baselining, and rule deployment and should be interpreted as conditional until those prerequisites are confirmed.

Azure

System Build Position

Azure is a post-compromise identity-plane detection layer for CVE-2026-5281. It should not be used to claim detection of the browser exploit itself. Its realistic value is in identifying suspicious identity, token, session, and privilege activity that may follow browser-origin compromise.

These detections are intended to identify:

·        suspicious interactive sign-ins by exposed or high-risk users

·        suspicious non-interactive or token-driven activity following suspicious user access

·        suspicious privilege, consent, or credential-related identity-plane changes by exposed users

These detections identify post-compromise identity and control-plane consequences, not the Dawn use-after-free exploit primitive itself.

Azure Deployment Constraint

These detections are production-grade in logic, but final deployment remains conditional on confirming:

·        SigninLogs availability and retention

·        AuditLogs availability and retention

·        visibility into IsInteractive, IPAddress, LocationDetails, DeviceDetail, and risk-related sign-in fields where used

·        either:

o   local enrichment for exposed users, high-risk users, and privileged identities

o   or fallback deployment using privileged-user scope and stronger behavioral deviation thresholds

·        baseline capability for:

o   new IP detection

o   new country / region detection

o   new device detection

o   new application usage detection

Until those validations are completed, these rules should be treated as deployment-ready templates pending Azure logging, enrichment, and baseline validation.

Rule Name
Suspicious Interactive Entra Sign-In by Exposed or High-Risk User from New Access Context

Deployment Type
Microsoft Sentinel Analytics Rule (KQL)

Severity
High

Purpose

Detect suspicious interactive Entra sign-ins by a user already associated with browser-compromise risk, exposed endpoint posture, or correlated endpoint detections, combined with a new or abnormal access context.

Detection Logic

Primary deployment mode:

·        the sign-in is interactive (IsInteractive == true)

·        the principal is in:

o   a high-risk-user watchlist

o   an exposed-browser-user watchlist

o   or correlated endpoint/browser-compromise context

·        the sign-in also presents at least one suspicious-access condition, such as:

o   source IP not seen for that user in the last 30 days

o   country / region not seen for that user in the last 30 days

o   device ID not seen for that user in the last 30 days

o   elevated sign-in risk or Conditional Access friction where available

Fallback deployment mode when watchlists are unavailable:

·        restrict scope to privileged users or sensitive user groups

·        require at least two abnormal-access conditions instead of one

Telemetry Dependency

·        SigninLogs

·        UserPrincipalName

·        IPAddress

·        LocationDetails.countryOrRegion

·        DeviceDetail.deviceId where available

·        sign-in risk fields where available

·        optional exposed-user or high-risk-user enrichment

Tuning Explanation

This rule is intentionally not a generic “new IP login” detector. It is designed to fire only when interactive sign-in activity is combined with browser-compromise-adjacent user risk or, in fallback mode, with stricter abnormal-access conditions.

Suppress:

·        known VPN egress points

·        corporate egress IPs

·        expected travel profiles

·        shared admin workstations

·        sanctioned break-glass patterns

Environment Localization Instructions

·        prefer deployment with exposed-user / high-risk-user watchlists

·        if watchlists are unavailable, restrict to privileged or sensitive users and require multi-condition deviation

·        baseline source IP, country / region, and device associations for user accounts

·        validate DeviceDetail.deviceId coverage before relying on device-based logic

·        stage deployment on high-value user populations first in large tenants

Response Action Guidance

·        review sign-in IP, country / region, device, and risk context

·        correlate with endpoint/browser detections for the same user

·        review active sessions and token state

·        escalate if the user is privileged, newly exposed, or using a newly observed device/IP combination

·        consider revoking sessions if corroborated

Performance Considerations

·        moderate due to baseline comparison

·        use capped set sizes and null filtering

·        stage on high-value or privileged populations first if tenant size is large

·        prefer scheduled analytics rather than continuous streaming execution

MITRE Mapping

T1078 – Valid Accounts
T1539 – Steal Web Session Cookie (conditional downstream context)

Execution Validity Status

Deployment-ready template requiring Entra sign-in visibility and either enrichment or fallback privileged-user scoping with baseline validation

Logical Notes

This rule detects suspicious interactive identity access following possible browser-origin compromise context, not the exploit primitive itself.

Deployment-Ready Rule Logic (KQL)

let baselinePeriod = 30d;
let Recent =
    SigninLogs
    | where TimeGenerated > ago(1d)
    | where IsInteractive == true
    | where ResultType == 0
    | project TimeGenerated, UserPrincipalName, IPAddress,
              Country=tostring(LocationDetails.countryOrRegion),
              DeviceId=tostring(DeviceDetail.deviceId),
              RiskLevelDuringSignIn, ConditionalAccessStatus;
let Baseline =
    SigninLogs
    | where TimeGenerated between (ago(baselinePeriod) .. ago(1d))
    | where IsInteractive == true
    | where ResultType == 0
    | where isnotempty(UserPrincipalName)
    | summarize
        KnownIPs = make_set_if(IPAddress, isnotempty(IPAddress), 128),
        KnownCountries = make_set_if(tostring(LocationDetails.countryOrRegion), isnotempty(tostring(LocationDetails.countryOrRegion)), 64),
        KnownDevices = make_set_if(tostring(DeviceDetail.deviceId), isnotempty(tostring(DeviceDetail.deviceId)), 128)
      by UserPrincipalName;
let HighRiskUsers = _GetWatchlist('HighRiskUserSet') | project UserPrincipalName=tostring(SearchKey);
let ExposedUsers = _GetWatchlist('ExposedBrowserUserSet') | project UserPrincipalName=tostring(SearchKey);
Recent
| join kind=leftouter Baseline on UserPrincipalName
| join kind=leftsemi (union HighRiskUsers, ExposedUsers) on UserPrincipalName
| extend NewIP = iff(isnotempty(IPAddress) and IPAddress !in (KnownIPs), 1, 0),
         NewCountry = iff(isnotempty(Country) and Country !in (KnownCountries), 1, 0),
         NewDevice = iff(isnotempty(DeviceId) and DeviceId !in (KnownDevices), 1, 0),
         RiskOrCA = iff(RiskLevelDuringSignIn !in ("none","low") or ConditionalAccessStatus !in ("success","notApplied"), 1, 0)
| where NewIP == 1 or NewCountry == 1 or NewDevice == 1 or RiskOrCA == 1

Rule Name
Suspicious Non-Interactive Sign-In or Token Use Following High-Risk Interactive Access

Deployment Type
Microsoft Sentinel Analytics Rule (KQL)

Severity
High

Purpose

Detect suspicious non-interactive sign-in or token-driven activity that follows a high-risk or exposed user’s interactive access and may indicate session reuse, token abuse, or application access after browser compromise.

Detection Logic

Trigger only when all of the following are true:

·        the event is non-interactive (IsInteractive == false)

·        the user is in:

o   a high-risk-user watchlist

o   an exposed-browser-user watchlist

o   or correlated endpoint/browser-compromise context

·        the activity is abnormal for that user, such as:

o   new source IP in the last 30 days

o   new country / region in the last 30 days

o   new application ID in the last 30 days

·        and the non-interactive activity occurs within a short window after a suspicious or high-risk interactive sign-in for the same user

Fallback deployment mode when enrichment is unavailable:

·        restrict to privileged users

·        require both:

o   a recent abnormal interactive sign-in

o   and at least one new non-interactive app or IP condition

Telemetry Dependency

·        SigninLogs

·        IsInteractive

·        UserPrincipalName

·        AppId

·        IPAddress

·        LocationDetails.countryOrRegion

·        high-risk / exposed-user enrichment or privileged-user scoping

·        recent interactive sign-in context

Tuning Explanation

This rule is intentionally not a generic “non-interactive login anomaly” detector. It is meant to identify token or session abuse after suspicious or high-risk interactive access by the same user.

Suppress:

·        expected Microsoft first-party background activity

·        known service-to-service identities

·        sanctioned automation and app-only patterns

·        expected long-lived application access for stable users

Environment Localization Instructions

·        separate human-user activity from service principals and managed identities

·        baseline per-user application access patterns

·        exclude common benign first-party app patterns where appropriate

·        tune the correlation window conservatively, starting at 2 hours

·        deploy first for privileged or high-value users if tenant volume is large

Response Action Guidance

·        review the recent interactive sign-in that preceded the non-interactive activity

·        evaluate the app, IP, region, and timing

·        review token/session state and revoke sessions if suspicious

·        correlate with endpoint/browser-origin detections for the same user

Performance Considerations

·        moderate to high depending on join volume

·        best implemented as a scheduled analytic with bounded windows

·        use watchlists and bounded baseline sets rather than unconstrained anomaly logic

·        stage deployment on high-value populations first where necessary

MITRE Mapping

T1550 – Use Alternate Authentication Material
T1078 – Valid Accounts

Execution Validity Status

Deployment-ready template requiring non-interactive sign-in visibility and either enrichment or privileged-user fallback with chained baseline validation

Logical Notes

This rule detects suspicious token or session use following high-risk user access, not the exploit primitive itself.

Deployment-Ready Rule Logic (KQL)

let baselinePeriod = 30d;
let HighRiskUsers = _GetWatchlist('HighRiskUserSet') | project UserPrincipalName=tostring(SearchKey);
let ExposedUsers = _GetWatchlist('ExposedBrowserUserSet') | project UserPrincipalName=tostring(SearchKey);
let RecentInteractive =
    SigninLogs
    | where TimeGenerated > ago(1d)
    | where IsInteractive == true
    | where ResultType == 0
    | join kind=leftsemi (union HighRiskUsers, ExposedUsers) on UserPrincipalName
    | project UserPrincipalName, InteractiveTime=TimeGenerated,
              InteractiveIP=IPAddress,
              InteractiveCountry=tostring(LocationDetails.countryOrRegion),
              InteractiveRisk=RiskLevelDuringSignIn,
              InteractiveCA=ConditionalAccessStatus;
let BaselineApps =
    SigninLogs
    | where TimeGenerated between (ago(baselinePeriod) .. ago(1d))
    | where IsInteractive == false
    | where isnotempty(UserPrincipalName)
    | summarize
        KnownIPs = make_set_if(IPAddress, isnotempty(IPAddress), 128),
        KnownCountries = make_set_if(tostring(LocationDetails.countryOrRegion), isnotempty(tostring(LocationDetails.countryOrRegion)), 64),
        KnownApps = make_set_if(AppId, isnotempty(AppId), 128)
      by UserPrincipalName;
SigninLogs
| where TimeGenerated > ago(1d)
| where IsInteractive == false
| join kind=leftsemi (union HighRiskUsers, ExposedUsers) on UserPrincipalName
| join kind=leftouter BaselineApps on UserPrincipalName
| join kind=innerunique RecentInteractive on UserPrincipalName
| where TimeGenerated between (InteractiveTime .. InteractiveTime + 2h)
| extend NewIP = iff(isnotempty(IPAddress) and IPAddress !in (KnownIPs), 1, 0),
         NewCountry = iff(isnotempty(tostring(LocationDetails.countryOrRegion)) and tostring(LocationDetails.countryOrRegion) !in (KnownCountries), 1, 0),
         NewApp = iff(isnotempty(AppId) and AppId !in (KnownApps), 1, 0)
| where NewIP == 1 or NewCountry == 1 or NewApp == 1

Rule Name
Suspicious Privilege, Consent, or Credential Modification by Exposed or High-Risk User

Deployment Type
Microsoft Sentinel Analytics Rule (KQL)

Severity
Critical

Purpose

Detect high-risk identity-plane changes by an exposed or high-risk user, especially those that indicate persistence, privilege increase, application abuse, or credential abuse after browser compromise.

Detection Logic

Trigger only when all of the following are true:

·        AuditLogs records a curated high-risk identity-plane action such as:

o   role membership addition

o   app consent grant

o   service principal or application credential addition

o   application permission update

·        the initiating user is in:

o   a high-risk-user watchlist

o   an exposed-browser-user watchlist

o   or correlated endpoint/browser-compromise context

·        and the action is abnormal for that user, such as:

o   first observed sensitive action in 30 days

o   outside approved admin window

o   initiating user not normally associated with identity administration

Fallback deployment mode when enrichment is unavailable:

·        restrict to privileged users or identities with admin-capable roles

·        require both:

o   a curated sensitive action

o   and first-observed / unusual-action logic

Telemetry Dependency

·        AuditLogs

·        OperationName

·        initiating identity

·        target resource context

·        high-risk / exposed-user enrichment or privileged-user fallback

·        admin-behavior baseline

Tuning Explanation

This rule is intentionally focused on persistence- and privilege-relevant identity actions, not general directory administration.

Prioritize operations such as:

·        Add member to role

·        Consent to application

·        Add service principal credentials

·        Add app role assignment to service principal

·        Update application

Suppress:

·        sanctioned identity lifecycle workflows

·        expected admin windows

·        known provisioning pipelines

·        expected delegated administration patterns

Environment Localization Instructions

·        maintain a curated sensitive audit-action set

·        baseline legitimate administrative behavior by user and role

·        separate human-admin from automation identities

·        if enrichment is unavailable, restrict to privileged-user scope and stronger deviation criteria

·        enrich with endpoint/browser-compromise context when possible

Response Action Guidance

·        immediate high-priority investigation

·        review initiating user, target resource, action timing, and follow-on actions

·        correlate with sign-in, session, and endpoint/browser detections

·        consider revocation of consent, credential removal, role rollback, or session invalidation if malicious context is supported

Performance Considerations

·        low to moderate

·        best when limited to a curated operation list and bounded baselines

·        avoid broad “all AuditLogs changes” alerting without behavior context

MITRE Mapping

T1098 – Account Manipulation
T1078 – Valid Accounts

Execution Validity Status

Deployment-ready template requiring audit-log visibility and either enrichment or privileged-user fallback with admin-behavior baselining

Logical Notes

This rule detects high-risk post-compromise identity-plane changes, not the exploit primitive itself.

Deployment-Ready Rule Logic (KQL)

let baselinePeriod = 30d;
let HighRiskUsers = _GetWatchlist('HighRiskUserSet') | project UserPrincipalName=tostring(SearchKey);
let ExposedUsers = _GetWatchlist('ExposedBrowserUserSet') | project UserPrincipalName=tostring(SearchKey);
let SensitiveOps = dynamic([
  "Add member to role",
  "Consent to application",
  "Add service principal credentials",
  "Add app role assignment to service principal",
  "Update application"
]);
let BaselineOps =
    AuditLogs
    | where TimeGenerated between (ago(baselinePeriod) .. ago(1d))
    | where OperationName in (SensitiveOps)
    | extend InitiatingUser = tostring(InitiatedBy.user.userPrincipalName)
    | where isnotempty(InitiatingUser)
    | summarize KnownOps = make_set(OperationName, 64) by InitiatingUser;
AuditLogs
| where TimeGenerated > ago(1d)
| where OperationName in (SensitiveOps)
| extend InitiatingUser = tostring(InitiatedBy.user.userPrincipalName)
| where isnotempty(InitiatingUser)
| join kind=leftsemi (union HighRiskUsers, ExposedUsers) on $left.InitiatingUser == $right.UserPrincipalName
| join kind=leftouter BaselineOps on InitiatingUser
| where OperationName !in (KnownOps) or isempty(KnownOps)

Azure Coverage Disposition

Behavior 1 — Chrome exploitation leading to abnormal browser process behavior

·       Coverage Disposition
Not Covered

Behavior 2 — Chrome-origin suspicious execution activity

·       Coverage Disposition
Not Covered

Behavior 3 — Post-compromise identity, token, or session abuse

·       Coverage Disposition
Detectable after Entra sign-in visibility, enrichment or fallback scoping, baselining, rule deployment, and telemetry validation are completed

Behavior 4 — Privilege escalation, consent abuse, or persistence in the identity plane

·       Coverage Disposition
Detectable after audit-log visibility, enrichment or fallback scoping, baselining, rule deployment, and telemetry validation are completed

Azure Engineering Note

Azure detections in this section are provided as deployment-ready templates for post-compromise identity-plane detection, not for direct detection of CVE-2026-5281 exploitation. Final production deployment requires validation of SigninLogs and AuditLogs coverage, availability of IsInteractive, IP, location, and device context where used, and either high-risk/exposed-user enrichment or privileged-user fallback scoping. Detection coverage statements assume successful logging, enrichment or fallback scoping, baselining, and rule deployment and should be interpreted as conditional until those prerequisites are confirmed.

GCP

System Build Position

GCP is a post-compromise identity and control-plane consequence detection layer for CVE-2026-5281. It should not be used to detect the browser exploit itself. Its value lies in identifying suspicious identity usage, token activity, and IAM control-plane changes following browser-origin compromise.

These detections focus on:

·        user-driven administrative or API activity

·        token exchange and temporary credential use

·        IAM policy and access-control changes

These detections identify post-compromise identity and control-plane consequences, not the exploit primitive.

GCP Deployment Constraint

These rules require:

·        Cloud Audit Logs enabled and centralized

·        Admin Activity logs (default)

·        Data Access logs enabled where needed

·        access to:

o   protoPayload.authenticationInfo.principalEmail

o   protoPayload.methodName

o   protoPayload.serviceName

o   source IP (requestMetadata.callerIp)

·        ability to:

o   distinguish service accounts (*.gserviceaccount.com)

o   maintain baseline sets (IP, service usage, method usage)

o   optionally enrich with exposed/high-risk users

If enrichment is unavailable, fallback deployment must restrict to:

·        privileged users

·        or high-value projects

Rule Name
Suspicious GCP Administrative Activity by User Identity from New Access Context

Deployment Type
Cloud Logging / SIEM Rule

Severity
High

Purpose

Detect suspicious administrative or control-plane activity by a user identity (not service account) combined with a new access context.

Detection Logic

Trigger when all are true:

·        log is Admin Activity or equivalent control-plane event

·        principalEmail does NOT end with .gserviceaccount.com

·        user is:

o   in HighRiskUserSet / ExposedBrowserUserSet
OR (fallback)

o   in privileged-user scope

·        AND one of:

o   caller IP not seen for user in last 30 days

o   serviceName not previously used by user

o   project / resource scope not previously accessed

o   privileged action outside normal admin window

Telemetry Dependency

·        Cloud Audit Logs

·        principalEmail

·        methodName, serviceName

·        requestMetadata.callerIp

·        baseline sets or reference tables

Tuning Explanation

This rule avoids generic anomaly detection by requiring:

·        identity risk OR privileged scope

·        AND concrete baseline deviation

Suppress:

·        known corporate egress IPs

·        approved admin hosts

·        expected project access patterns

·        known automation identities

Environment Localization Instructions

·        classify identities:

o   user vs service account via email pattern

·        baseline per-user:

o   IP usage

o   service usage

o   project scope

·        deploy first on:

o   privileged users

o   high-value projects

Response Action Guidance

·        review identity, IP, service, method, and project

·        correlate with endpoint/browser detections

·        escalate if:

o   new project access

o   new admin surface

o   privileged identity involved

·        consider session/token containment

MITRE Mapping

T1078 – Valid Accounts
T1098 – Account Manipulation

Execution Validity Status

Deployment-ready template requiring audit logs, identity classification, and baseline validation

Deployment-Ready Rule Logic

WHEN
  log.type = AdminActivity
  AND principalEmail NOT LIKE *.gserviceaccount.com
  AND (
    principalEmail IN HighRiskUserSet
    OR principalEmail IN ExposedBrowserUserSet
    OR principalEmail IN PrivilegedUserSet (fallback)
  )
  AND (
    callerIp is new for user (30d)
    OR serviceName is new for user (30d)
    OR resource/project is new for user
    OR privileged action occurs outside expected window
  )
THEN
  Generate high-severity alert

Rule Name
Suspicious Security Token Service or Token Exchange Activity by User Identity

Deployment Type
Cloud Logging / SIEM Rule

Severity
High

Purpose

Detect suspicious token exchange or short-lived credential activity that may indicate session or token abuse following compromise.

Detection Logic

Trigger when all are true:

·        serviceName = iamcredentials.googleapis.com OR sts.googleapis.com

·        methodName includes:

o   GenerateAccessToken

o   GenerateIdToken

o   ExchangeToken

·        identity is NOT a service account

·        user is:

o   high-risk / exposed
OR (fallback)

o   privileged user

·        AND one of:

o   caller IP not seen for user in last 30 days

o   token method not previously used by user

o   target resource/project not previously accessed

·        AND optionally:

o   activity occurs within 2 hours of suspicious interactive activity

Telemetry Dependency

·        Cloud Audit Logs

·        STS / IAMCredentials logging

·        principalEmail

·        methodName

·        callerIp

·        baseline sets

Tuning Explanation

This rule detects token abuse by combining:

·        identity risk or privileged scope

·        AND first-seen token behavior

Suppress:

·        workload identity federation

·        CI/CD identities

·        known service accounts

·        expected developer tooling patterns

Environment Localization Instructions

·        exclude:

o   .gserviceaccount.com identities

·        baseline:

o   token method usage

o   project scope

·        restrict initial deployment to privileged users if needed

Response Action Guidance

·        review token issuance context

·        correlate with endpoint/browser activity

·        review downstream API usage

·        escalate if:

o   new token behavior

o   privileged access

·        consider token revocation

MITRE Mapping

T1550 – Use Alternate Authentication Material
T1078 – Valid Accounts

Execution Validity Status

Deployment-ready template requiring STS audit visibility and baseline validation

Deployment-Ready Rule Logic

WHEN
  serviceName IN (sts.googleapis.com, iamcredentials.googleapis.com)
  AND methodName IN (GenerateAccessToken, GenerateIdToken, ExchangeToken)
  AND principalEmail NOT LIKE *.gserviceaccount.com
  AND (
    principalEmail IN HighRiskUserSet
    OR principalEmail IN ExposedBrowserUserSet
    OR principalEmail IN PrivilegedUserSet (fallback)
  )
  AND (
    callerIp is new for user (30d)
    OR methodName is new for user (30d)
    OR resource/project is new for user
  )
THEN
  Generate high-severity alert

GCP Rule 3

Rule Name
Sensitive IAM Policy or Access-Control Change by User Identity

Deployment Type
Cloud Logging / SIEM Rule

Severity
Critical

Purpose

Detect high-risk IAM or access-control changes that indicate privilege escalation, persistence, or access expansion following compromise.

Detection Logic

Trigger when all are true:

·        serviceName = cloudresourcemanager.googleapis.com OR iam.googleapis.com

·        methodName includes:

o   SetIamPolicy

o   CreateServiceAccountKey

o   AddIamPolicyBinding

o   SetOrgPolicy

·        identity is NOT a service account

·        user is:

o   high-risk / exposed
OR (fallback)

o   privileged user

·        AND one of:

o   method not seen for user in last 30 days

o   resource scope not previously accessed

o   action outside approved admin window

Telemetry Dependency

·        Cloud Audit Logs

·        IAM / Resource Manager logs

·        principalEmail

·        methodName

·        resource context

·        baseline sets

Tuning Explanation

This rule focuses only on privilege-relevant IAM changes, not general configuration.

Suppress:

·        provisioning pipelines

·        expected admin workflows

·        infrastructure-as-code systems

·        delegated administration patterns

Environment Localization Instructions

·        maintain curated method list

·        baseline IAM activity per user

·        separate:

o   human admin

o   automation identities

·        deploy first on:

o   privileged users

o   sensitive projects

Response Action Guidance

·        immediate investigation

·        review IAM change and affected resources

·        correlate with browser compromise indicators

·        rollback policy if malicious

·        consider credential rotation

MITRE Mapping

T1098 – Account Manipulation
T1078 – Valid Accounts

Execution Validity Status

Deployment-ready template requiring IAM audit visibility and baseline validation

Deployment-Ready Rule Logic

WHEN
  serviceName IN (iam.googleapis.com, cloudresourcemanager.googleapis.com)
  AND methodName IN (SetIamPolicy, CreateServiceAccountKey, AddIamPolicyBinding, SetOrgPolicy)
  AND principalEmail NOT LIKE *.gserviceaccount.com
  AND (
    principalEmail IN HighRiskUserSet
    OR principalEmail IN ExposedBrowserUserSet
    OR principalEmail IN PrivilegedUserSet (fallback)
  )
  AND (
    methodName is new for user (30d)
    OR resource scope is new for user
    OR action occurs outside approved window
  )
THEN
  Generate critical alert

GCP Coverage Disposition

Behavior 1 — Chrome exploitation leading to abnormal browser process behavior

·       Coverage Disposition
Not Covered

Behavior 2 — Chrome-origin suspicious execution activity

·       Coverage Disposition
Not Covered

Behavior 3 — Post-compromise identity, token, or cloud-control activity

·       Coverage Disposition
Detected after logging, enrichment or fallback scoping, and baseline validation

Behavior 4 — Privilege escalation or persistence in control plane

·       Coverage Disposition
Detected after IAM audit visibility and baseline validation

GCP Engineering Note

GCP detections in this section are deployment-ready templates for post-compromise identity and control-plane detection, not exploit detection. Final deployment requires validation of audit logging, identity classification, baseline capability, and either enrichment or privileged-user fallback scoping. Coverage remains conditional until these prerequisites are confirmed.


S26 Threat-to-Rule Traceability Matrix

Behavior 1 — Browser Renderer Exploitation (Chrome Memory Corruption Execution)

Description

Exploitation of CVE-2026-5281 occurs within the Chrome renderer process via memory corruption, enabling attacker-controlled code execution inside the browser sandbox without immediate observable external telemetry.

Mapped Detection Logic Types

·        None (no S25-aligned detection possible)

Coverage Disposition

Not Covered

Telemetry Dependency

·        Endpoint: Not available at required granularity

·        Network: Not applicable

·        Identity: Not applicable

Rationale

This behavior is fully contained within browser memory space and does not reliably generate portable detection signals across endpoint, network, or identity telemetry.

Behavior 2 — Browser-Origin Process Execution (Renderer Escape to System Execution)

Description

Following exploitation, the browser spawns or triggers execution of system-level processes (for example PowerShell, mshta, rundll32) originating from the Chrome process context.

Mapped Detection Logic Types

·        Endpoint:

o   Browser parent → scripting engine or LOLBin execution detection

o   Browser spawning abnormal child process chains

·        Network:

o   Correlated outbound staging traffic following process spawn

Coverage Disposition

Detected

Telemetry Dependency

·        Endpoint: Process creation telemetry (EDR)

·        Network: Outbound connection telemetry

Rationale

This stage produces high-confidence behavioral signals:

·        abnormal parent-child relationships

·        script interpreter execution from browser context

This is a primary detection anchor in the attack chain.

Behavior 3 — Browser-Origin Script-Based Payload Retrieval and Staging

Description

Post-exploitation, the attacker retrieves secondary payloads using script-based mechanisms (PowerShell, JavaScript, HTA) initiated from the compromised browser context.

Mapped Detection Logic Types

·        Endpoint:

o   Encoded command execution detection

o   Script-based download and execution logic

·        Network:

o   Suspicious outbound HTTP/S retrieval patterns

·        File/Memory:

o   Script stager artifact detection (YARA)

Coverage Disposition

Detected

Telemetry Dependency

·        Endpoint: Script execution telemetry

·        Network: HTTP/S traffic telemetry

·        Endpoint/File: Artifact scanning capability

Rationale

This stage generates multi-pillar detection signals:

·        encoded commands

·        download functions

·        staging artifacts

This behavior is strongly covered across S25 logic.

Behavior 4 — Browser Session Abuse, Token Reuse, or Credential Material Exploitation

Description

The attacker leverages browser-derived session tokens, authentication artifacts, or credentials to access cloud or identity platforms without re-authentication.

Mapped Detection Logic Types

·        Identity:

o   Non-interactive sign-in following interactive access correlation

o   Token reuse and session chaining detection

·        Cloud:

o   STS token usage anomaly detection

o   Token exchange or temporary credential issuance anomalies

Coverage Disposition

Detected

Telemetry Dependency

·        Identity: Entra ID / IAM / GCP identity logs

·        Endpoint: Supporting compromise context (optional)

·        Network: Not primary

Rationale

Identity-plane telemetry enables:

·        token misuse detection

·        session reuse identification

·        abnormal authentication flow detection

This is a critical secondary detection layer.

Behavior 5 — Post-Compromise Privilege Escalation and Persistence via Identity and IAM Manipulation

Description

The attacker performs privilege escalation or persistence actions using compromised identity access, including role assignments, policy modification, or credential creation.

Mapped Detection Logic Types

·        Identity:

o   Privileged role assignment detection

o   Application consent and credential modification detection

·        Cloud:

o   IAM policy modification detection

o   Access key or service account credential creation detection

Coverage Disposition

Detected

Telemetry Dependency

·        Identity: Audit logs (Entra ID, IAM)

·        Cloud: CloudTrail / Audit Logs

·        Endpoint: Not primary

Rationale

Privilege manipulation generates high-fidelity audit events and is strongly covered by S25 rules.

Behavior 6 — Cloud Resource Access Expansion and Lateral Movement via Compromised Identity

Description

The attacker expands access across cloud resources, accounts, projects, or services using compromised identity or tokens derived from browser-origin compromise.

Mapped Detection Logic Types

·        Cloud:

o   First-seen project or account access detection

o   New service usage by identity

o   Cross-account or cross-project access anomalies

·        Identity:

o   New application or resource access patterns

Coverage Disposition

Partially Detected

Telemetry Dependency

·        Cloud: Audit logs (AWS, Azure, GCP)

·        Identity: Access and sign-in logs

·        Endpoint: Not primary

Rationale

Detection depends on:

·        baseline availability

·        logging completeness

·        identity classification

Coverage is partial due to environment dependency.

Behavior 7 — Data Access, Collection, or Exfiltration via Compromised Identity

Description

The attacker accesses or extracts data from cloud services or internal systems using compromised identity access established through browser-origin exploitation.

Mapped Detection Logic Types

·        Network:

o   Suspicious outbound data transfer patterns

·        Cloud:

o   Abnormal data access patterns (conditional)

·        Identity:

o   Unusual data-access application usage

Coverage Disposition

Partially Detected

Telemetry Dependency

·        Network: Outbound traffic monitoring

·        Cloud: Data Access logs (often disabled by default)

·        Identity: Application access logs

Rationale

Detection is highly dependent on:

·        Data Access logging being enabled

·        baseline behavior availability

This creates conditional and partial coverage.

Behavior 8 — Conditional Post-Exploitation Objectives (Environment-Dependent)

Description

Not observed in currently available reporting; may occur during post-exploitation depending on attacker objectives and target environment.

Includes:

·        ransomware deployment

·        long-term persistence mechanisms

·        additional malware staging

Mapped Detection Logic Types

·        Endpoint:

o   Behavioral malware execution detection

·        Network:

o   C2 communication detection

Coverage Disposition

Hunt Only

Telemetry Dependency

·        Endpoint: Behavioral detection

·        Network: Communication patterns

·        Identity: Not primary

Rationale

These behaviors are:

·        objective-dependent

·        not guaranteed in this exploit chain


Detection remains hunt-oriented.

S26 Coverage Integrity Summary

Detected Behaviors

·        Browser-origin process execution

·        Script-based payload staging

·        Token/session abuse

·        Privilege escalation via identity/IAM

Partially Detected Behaviors

·        Cloud lateral movement

·        Data access and exfiltration

Hunt Only Behaviors

·        Conditional post-exploitation activity

Not Covered Behaviors

·        Initial browser renderer exploitation

S27 Behavior & Log Artifacts

·        Chrome process crash and restart telemetry tied to specific browsing sessions

·        Endpoint logs showing exploit-prevention or memory-corruption alerts associated with Chrome

·        Time-correlated sequence of browsing activity followed by endpoint anomaly events

·        Repeated anomaly sequences across endpoints accessing the same external content

·        Deviation in Chrome behavior from local baseline within a defined browsing window

This section captures logged manifestations and correlated behavior sequences, not detection signals.

S28 Detection Strategy and SOC Implementation Guidance

·        Build investigation workflows that begin with suspicious destination access and validate immediate Chrome anomaly correlation

·        Prioritize triage of Chrome exploit-prevention, crash, and anomaly telemetry linked to specific browsing events

·        Correlate email, proxy, DNS, and endpoint telemetry within a shared time window

·        Hunt for repeated destination-linked anomaly patterns across users

·        Avoid reliance on static IOC matching until validated infrastructure is available


SOC workflows should treat destination-linked Chrome anomaly sequences as priority investigation triggers.

S29 Detection Coverage Summary

Detected Behaviors

·        Destination-linked Chrome anomaly telemetry

·        Endpoint exploit-prevention or memory-corruption alerts tied to Chrome

·        Repeated anomaly sequences associated with the same browsing interaction

Conditional Post-Exploitation Behaviors

·        Additional payload retrieval following successful browser exploitation

·        Credential or session abuse after compromise of the browsing context

·        Lateral movement or persistence behavior originating from the endpoint


Not observed in currently available reporting; may occur during post-exploitation depending on attacker objectives and target environment.

S30 Intelligence Maturity Assessment

·        Detection Maturity: Moderate in environments with strong browser-aware endpoint telemetry and cross-source correlation

·        Telemetry Coverage: Variable depending on availability of endpoint crash, exploit-prevention, DNS, proxy, and click-through telemetry

·        Detection Engineering Capability: Stronger where teams correlate delivery, interaction, and anomaly rather than rely on signatures

·        Response Readiness: Higher in environments that can rapidly isolate affected endpoints and reconstruct pre-exploitation browsing activity


Performance depends on correlation accuracy, not signature coverage.

S31 Mitigation and Remediation

Remediation of CVE-2026-5281 requires removal of the vulnerable Chrome condition and verification that exposed user endpoints are no longer running affected versions.

·        Upgrade Google Chrome to version 146.0.7680.178 or later on all managed endpoints

·        Validate version compliance across corporate endpoints, remote-user systems, and exception populations

·        Remove or isolate endpoints that cannot be updated within the required remediation window

·        Confirm that browser update enforcement policies prevent rollback, drift, or unmanaged lagging versions

The remediation objective is elimination of the vulnerable browser execution condition.

S32 Security Control Recommendations

·        Enforce centralized browser version management with compliance reporting and exception handling

·        Deploy endpoint protections capable of detecting browser memory-corruption behavior associated with renderer-process exploitation

·        Apply DNS and web filtering to reduce user exposure to attacker-controlled content delivery paths

·        Restrict browser-origin execution paths where operationally feasible

·        Apply enhanced controls to privileged users whose browser sessions expose sensitive systems or data

These controls reduce content-triggered browser execution risk and downstream impact of renderer-origin compromise.

S33 Strategic Defensive Improvements

·        Move browser update enforcement to an auditable, continuously validated control

·        Introduce browser isolation for users exposed to high-risk content interaction

·        Integrate browser anomaly telemetry into centralized security monitoring workflows

·        Build correlation models linking content access, browser anomaly, and endpoint deviation

·        Reduce reliance on browser-based access for sensitive operational workflows

Control Impact Mapping

·        Browser Version Enforcement
Eliminates the vulnerable execution condition before exploitation can be triggered

·        Endpoint Exploit Protection
Detects or interrupts abnormal renderer-process behavior associated with exploitation

·        DNS / Web Filtering
Reduces exposure to attacker-controlled content that initiates exploitation

·        Browser Isolation
Prevents direct endpoint impact from renderer-level compromise

·        Cross-Telemetry Correlation
Enables early identification of content-triggered browser anomaly sequences

S34 Defensive Architecture Overview

Network Layer

·        DNS filtering and proxy enforcement controlling access to external content sources

·        Monitoring of destination access patterns associated with browser activity

Identity Layer

·        Segmentation of privileged users from unrestricted browser usage

·        Conditional access controls for users interacting with sensitive systems

Application / Appliance Layer

·        Centralized browser version governance ensuring vulnerable versions are not present

·        Enforcement of browser security posture at the application level

·        Isolation mechanisms applied to browser execution environments

Correlation Layer

·        Correlation of email, DNS, proxy, and endpoint telemetry

·        Detection logic focused on content access → browser anomaly → endpoint deviation

·        Investigation workflows prioritizing destination-linked anomaly sequences

S35 Security Hardening Guidance

·        Enforce strict browser update deadlines with compliance validation

·        Prohibit privileged system administration from unrestricted browser sessions

·        Limit browser-based access to sensitive systems where alternative access paths exist

·        Increase endpoint visibility into browser-origin execution behavior

·        Treat repeated Chrome anomaly activity following content interaction as a security incident requiring investigation

S36 Security Program Maturity Assessment

Detection Maturity

Moderate — detection capability is dependent on identifying renderer-process execution anomalies resulting from browser use-after-free exploitation in Chrome and correlating those events across endpoint and network telemetry, as no exploit-specific signatures or direct detection mechanisms are available

Telemetry Coverage

Moderate to Strong — endpoint, DNS, proxy, and email telemetry enable correlation of content access, Chrome process anomaly events, and subsequent endpoint activity; vulnerability scanners provide high-confidence visibility into exposed Chrome versions but do not provide runtime visibility into exploitation

Response Readiness

Moderate — effectiveness depends on the ability to rapidly identify exposed systems through vulnerability scanning output, isolate affected endpoints, and reconstruct user browsing activity associated with Chrome-origin anomaly events

Hardening Maturity

\Moderate to Strong — higher in environments with enforced Chrome version governance, restricted access to untrusted web content, and controlled browser usage for privileged users interacting with sensitive systems

Control Effectiveness Score

Moderate to High — vulnerability scanners, including Tenable plugins 304472 and 304473, provide high effectiveness in identifying exposed systems through version-based detection; endpoint and network controls provide moderate effectiveness in identifying exploitation outcomes due to lack of exploit-specific visibility into renderer-process compromise

Audit Evidence Statement

Evidence includes Chrome version compliance data derived from vulnerability scanning results, including Tenable plugin outputs, endpoint telemetry capturing Chrome process anomaly or exploit-prevention events, and DNS or proxy logs showing destination access correlated with browser-driven activity

Security Program Integration Note

Integrate vulnerability scanning, endpoint detection, web access controls, and incident response workflows so that scanner-identified exposure drives prioritization, Chrome renderer-origin anomaly events trigger coordinated response actions, and browser version compliance is continuously enforced across managed and unmanaged endpoints

Figure 7

S37 Residual Risk and Forward Outlook

Residual risk remains where vulnerable Chrome versions persist, where users maintain unrestricted access to attacker-controlled content, or where browser anomaly telemetry is not operationalized.

Forward risk is driven by:

·        Increased availability of exploit techniques targeting browser memory-corruption conditions

·        Continued reliance on browser-mediated access to sensitive systems

·        Potential chaining of renderer-process execution into broader endpoint compromise

Organizations that do not enforce browser governance and anomaly correlation remain exposed to content-triggered renderer-origin execution pathways.

S38 Intelligence Confidence Assessment

Confidence Level
High

Confidence Rationale
Confidence is high because vendor reporting confirms active exploitation of CVE-2026-5281 and clearly identifies the vulnerability as a use-after-free condition in the Chrome Dawn component. The assessed exploitation model is consistent with established browser memory-corruption behavior that can produce renderer-process execution through user interaction with malicious web content. Exposure assessment and defensive guidance are also supported by validated version-based scanner coverage, including Tenable Nessus plugin coverage for affected Chrome versions.

Confidence Limitations
Public technical details on exploit delivery, payload behavior, and post-exploitation activity remain limited, restricting visibility into the full exploit chain. No confirmed reusable infrastructure indicators, payload hashes, or exploit artifacts are currently available in public reporting. Detection engineering is therefore constrained to behavioral correlation and version-based exposure identification rather than exploit-specific signature matching. Post-exploitation behavior may vary depending on attacker objectives and the target environment.

S39 Analytical Notes and Limitations

·        Analysis is based on vendor-confirmed exploitation status, vulnerability disclosures, and known browser memory-corruption tradecraft rather than full public exploit transparency

·        Detection strategy is behavior-driven because no reliable exploit-content signatures or confirmed public infrastructure indicators are available

·        Vulnerability scanner coverage provides strong visibility into exposed Chrome versions but does not provide runtime visibility into exploitation activity

·        Assessment of downstream impact is based on browser-mediated access to systems, sessions, and data rather than direct public-facing infrastructure compromise

·        Post-exploitation actions, including payload retrieval, credential abuse, persistence, or lateral movement, are not confirmed in current public reporting and may vary depending on attacker objectives and target environment

S40 References

Vendor Advisory

·        Google Chrome Releases — Security fixes addressing CVE-2026-5281

o   hxxps://chromereleases[.]googleblog[.]com/

Vulnerability Records

·        CVE-2026-5281 — Use-after-free in Chrome Dawn component

o   hxxps://nvd[.]nist[.]gov/

·        Tenable Nessus Plugin Coverage — Google Chrome less than 146.0.7680.177 Multiple Vulnerabilities

o   hxxps://www[.]tenable[.]com/cve/CVE-2026-5281/plugins

Known Exploited Vulnerabilities (KEV)

·        CISA Known Exploited Vulnerabilities Catalog

o   hxxps://www[.]cisa[.]gov/known-exploited-vulnerabilities-catalog

Analytical Framework

·        MITRE ATT&CK Framework

o   hxxps://attack[.]mitre[.]org/

Next
Next

[CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992