Qualcomm Android Zero-Day and Chrome AI Extension Risks [Prime Cyber Insights]
Qualcomm Android Zero-Day and Chrome AI Extension Risks [Prime Cyber Insights]
Prime Cyber Insights

Qualcomm Android Zero-Day and Chrome AI Extension Risks [Prime Cyber Insights]

In today's briefing, we analyze the exploitation of a high-severity zero-day in a Qualcomm Android component and a critical flaw in Chrome’s Gemini side panel. Google confirmed that CVE-2026-21385, a buffer over-read in the Qualcomm Graphics component, is

Episode E1108
March 3, 2026
05:19
Hosts: Neural Newscast
News
Android Security
Qualcomm Zero-Day
Chrome Gemini
CVE-2026-0628
SloppyLemming
BurrowShell
Cegedim Sante
France Medical Breach
Rust Malware
Cloudflare Workers
PrimeCyberInsights

Now Playing: Qualcomm Android Zero-Day and Chrome AI Extension Risks [Prime Cyber Insights]

Download size: 9.8 MB

Share Episode

SubscribeListen on Transistor

Episode Summary

In today's briefing, we analyze the exploitation of a high-severity zero-day in a Qualcomm Android component and a critical flaw in Chrome’s Gemini side panel. Google confirmed that CVE-2026-21385, a buffer over-read in the Qualcomm Graphics component, is currently under targeted exploitation. Simultaneously, research from Malwarebytes highlights CVE-2026-0628, which allowed low-privilege extensions to hijack Chrome's AI-integrated side panel, gaining unauthorized access to cameras, microphones, and local files. We also examine the SloppyLemming threat group's recent campaign targeting Pakistan and Bangladesh. Arctic Wolf reports the group has significantly expanded its infrastructure, utilizing over 112 Cloudflare Workers to deploy the BurrowShell backdoor and a new Rust-based keylogger. Finally, we cover a massive data breach in France, where 15.8 million administrative records were stolen from the medical software provider Cegedim Santé, including sensitive notes penned by physicians. Chad Thompson joins us to discuss the systemic risks of integrating AI agents into browser environments and the ongoing challenges of third-party software supply chains in critical infrastructure.

Subscribe so you don't miss the next episode

Show Notes

Today’s briefing examines critical vulnerabilities in mobile and browser ecosystems, starting with a confirmed zero-day in a Qualcomm Graphics component affecting Android devices. Google reports that CVE-2026-21385 is seeing limited, targeted exploitation in the wild, necessitating immediate patching via the March 2026 security update. We then pivot to the risks of 'agentic' AI, detailing a high-severity flaw in Chrome’s Gemini panel that allowed extensions to bypass traditional isolation boundaries. The episode also analyzes the SloppyLemming group's evolving tactics in South Asia, including their transition to Rust-based malware and extensive use of Cloudflare Workers. Finally, we address the theft of 15.8 million medical records from France’s health ministry via a third-party breach at Cegedim Santé.

Topics Covered

  • 🔒 Android and Qualcomm Zero-Day exploitation analysis.
  • 🤖 Chrome Gemini extension hijacking risks and CVE-2026-0628.
  • ⚠️ SloppyLemming's regional infrastructure expansion and Rust malware.
  • 🏥 French health ministry data breach at Cegedim Santé.
  • 🛡️ Strategic implications for enterprise resilience and risk math.

Disclaimer: Prime Cyber Insights provides practitioner-oriented analysis; listeners should consult their own security policies and vendor advisories for specific implementation guidance.

Neural Newscast is AI-assisted, human reviewed. View our AI Transparency Policy at NeuralNewscast.com.

  • (00:28) - Mobile and AI Vulnerabilities
  • (03:18) - Conclusion

Transcript

Full Transcript Available
[00:00] Announcer: From Neural Newscast, this is Prime Cyber Insights, Intelligence for Defenders, Leaders, and Decision Makers. [00:06] Announcer: In the briefing room from March 3rd, 2026, I'm Aaron Cole with Prime Cyber Insights. [00:12] Announcer: We are moving fast today. [00:14] Announcer: Join us today as Chad Thompson, a director-level AI and security leader with a systems-level perspective on automation, enterprise risk, and operational resilience. [00:25] Announcer: Chad, it's great to have you. [00:28] Aaron Cole: Glad to be here, Lauren. [00:30] Aaron Cole: We're seeing a fundamental shift in the browser attack surface as we move toward agentic models. [00:36] Aaron Cole: And the news this morning really highlights that risk. [00:40] Lauren Mitchell: Exactly. Mauerbytes reported on a high-severity flaw, CVE 2020-60628, in the Chrome Gemini side panel. [00:51] Lauren Mitchell: It essentially allowed a low-privilege extension to inherit the AI's powerful permissions, [00:57] Lauren Mitchell: camera, microphone, and even local file access. [01:01] Lauren Mitchell: Chad, how does this change the way we evaluate extension security? [01:07] Aaron Cole: It breaks the traditional sandbox model, Lauren. [01:10] Aaron Cole: Usually, extensions are isolated, but because the Gemini panel is a trusted, high-privileged [01:16] Aaron Cole: component, a simple extension could tamper with its traffic and drive the AI autonomously. [01:24] Aaron Cole: It turns the AI into a command broker for the attacker. [01:28] Aaron Cole: Bypassing user consent prompts entirely. [01:32] Lauren Mitchell: Switching to mobile, Google has confirmed that a Qualcomm Graphics Component Zero Day [01:37] Lauren Mitchell: CVE 2026-21-385 is under targeted exploitation. [01:44] Lauren Mitchell: Chad, this is a buffer overread impacting the kernel level. [01:49] Lauren Mitchell: What is the practitioner's takeaway here? [01:51] Aaron Cole: The urgency is the takeaway, Aaron. [01:55] Aaron Cole: When Google flags targeted exploitation in their monthly bulletin, it means the threat is no longer theoretical. [02:03] Aaron Cole: This flaw allows for memory corruption by adding user-supplied data without checking buffer space. [02:12] Aaron Cole: For enterprise fleets, this isn't just a software bug. [02:15] Aaron Cole: It's a hardware-adjacent vulnerability that requires immediate patch orchestration. [02:22] Lauren Mitchell: It is a massive patch cycle, too. 129 vulnerabilities in the March update alone. [02:30] Lauren Mitchell: But while we're tracking zero days, we are also seeing a significant escalation in regional campaigns. [02:36] Announcer: That brings us to sloppy lemming. [02:39] Announcer: Arctic Wolf reports this group has dramatically expanded its infrastructure, [02:44] Announcer: targeting government and energy sectors in Pakistan and Bangladesh, [02:49] Announcer: They have scaled from 13 Cloudflare workers to 112 in just a year, using a custom backdoor called Burroughshel. [02:59] Lauren Mitchell: And they have transitioned to Rust for their keyloggers, which makes detection much harder. [03:06] Lauren Mitchell: Meanwhile, in Europe, we are seeing the fallout of a major supply chain hit. [03:12] Lauren Mitchell: 15.8 million medical records were stolen from the French Health Ministry via a breach at the software supplier Sejidim Sante. [03:21] Announcer: The register reports that about 165,000 of those files contained actual notes penned by doctors, including sensitive details like HIV status, [03:33] Announcer: Chad, looking at C.J. Deem-Sante and the Chrome flaw together, what is the common thread for risk leaders? [03:41] Aaron Cole: The common thread is the failure of third-party boundaries, Aaron. [03:45] Aaron Cole: Whether it's a trusted browser extension or a government-mandated medical software provider. [03:51] Aaron Cole: The system-level risk is that we are delegating high-value data access to entities that aren't being audited at the level their permissions require. [04:04] Aaron Cole: We have to move from trusting the platform to verifying the path of the data. [04:09] Chad Thompson: A clear reminder that resilience isn't just about internal controls, but managing the entire [04:15] Chad Thompson: ecosystem. [04:17] Chad Thompson: Chad, thank you for the analysis today. [04:19] Announcer: That is the briefing for today. [04:21] Announcer: For technical details on the CVEs and campaigns mentioned, visit pci.neuralnewscast.com. [04:29] Announcer: I'm Erin Cole. [04:31] Lauren Mitchell: And I'm Lauren Mitchell. [04:32] Lauren Mitchell: This has been Prime Cyber Insights. [04:35] Lauren Mitchell: Note that our coverage is for informational purposes. [04:38] Lauren Mitchell: Always verify security steps with your internal engineering teams. [04:42] Lauren Mitchell: We'll see you tomorrow. [04:44] Lauren Mitchell: Neural Newscast is AI-assisted, human-reviewed. [04:48] Lauren Mitchell: View our AI transparency policy at neuralnewscast.com. [04:52] Announcer: This has been Prime Cyber Insights on Neural Newscast, [04:56] Announcer: Intelligence for Defenders, Leaders, and Decision Makers. [04:59] Announcer: Neural Newscast uses artificial intelligence in content creation [05:03] Announcer: with human editorial review prior to publication. [05:06] Announcer: While we strive for factual, unbiased reporting, AI-assisted content may occasionally contain [05:12] Announcer: errors. Verify critical information with trusted sources. Learn more at neuralnewscast.com.

✓ Full transcript loaded from separate file: transcript.txt

Loading featured stories...