{"id":535758,"date":"2026-04-17T10:04:11","date_gmt":"2026-04-17T10:04:11","guid":{"rendered":"https:\/\/www.newsbeep.com\/uk\/535758\/"},"modified":"2026-04-17T10:04:11","modified_gmt":"2026-04-17T10:04:11","slug":"recently-leaked-windows-zero-days-now-exploited-in-attacks","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/uk\/535758\/","title":{"rendered":"Recently leaked Windows zero-days now exploited in attacks"},"content":{"rendered":"<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" alt=\"Windows\" height=\"900\" src=\"https:\/\/www.newsbeep.com\/uk\/wp-content\/uploads\/2026\/04\/Windows-headpic.jpg\" width=\"1600\"\/><\/p>\n<p>Threat actors are exploiting three recently disclosed Windows security vulnerabilities in attacks aimed at gaining SYSTEM or elevated administrator permissions.<\/p>\n<p>Since the start of the month, a security researcher known as &#8220;Chaotic Eclipse&#8221; or &#8220;Nightmare-Eclipse&#8221; has published proof-of-concept exploit code for all three security issues in protest to how Microsoft&#8217;s Security Response Center (MSRC) handled the disclosure process.<\/p>\n<p>Two of the vulnerabilities (dubbed <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit\/\" target=\"_blank\" rel=\"nofollow noopener\">BlueHammer<\/a> and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/new-microsoft-defender-redsun-zero-day-poc-grants-system-privileges\/\" target=\"_blank\" rel=\"nofollow noopener\">RedSun<\/a>) are Microsoft Defender local privilege escalation (LPE) flaws, while the third (known as <a href=\"https:\/\/github.com\/Nightmare-Eclipse\/UnDefend\" target=\"_blank\" rel=\"nofollow noopener\">UnDefend<\/a>) can be exploited as a standard user to block Microsoft Defender definition updates.<\/p>\n<p> <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/uk\/wp-content\/uploads\/2026\/04\/as-tour-the-platform-970-x250.jpg\" alt=\"Wiz\" style=\"margin-top: 0px;\"\/><\/a><\/p>\n<p>At the time of the leak, the security flaws these exploits targeted were considered zero-days by <a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-vulnerability-management\/tvm-zero-day-vulnerabilities?tabs=preview-customers%2Cpreview-customers-vulnerabilities\" target=\"_blank\" rel=\"nofollow noopener\">Microsoft&#8217;s definition<\/a>, since they had no official patches or updates to address them.<\/p>\n<p>On Thursday, Huntress Labs security researchers <a href=\"https:\/\/x.com\/HuntressLabs\/status\/2044882050314817880\" target=\"_blank\" rel=\"nofollow noopener\">reported<\/a> seeing all three zero-day exploits deployed in the wild, with the BlueHammer vulnerability being exploited since April 10.<\/p>\n<p>They also <a href=\"https:\/\/x.com\/HuntressLabs\/status\/2044882115574091960\" target=\"_blank\" rel=\"nofollow noopener\">spotted UnDefend and RedSun exploits<\/a> on a Windows device that was breached using a compromised SSLVPN user, in attacks showing evidence of &#8220;hands-on-keyboard threat actor activity.&#8221;<\/p>\n<p>&#8220;The Huntress SOC is observing the use of Nightmare-Eclipse&#8217;s BlueHammer, RedSun, and UnDefend exploitation techniques,&#8221; the researchers said.<\/p>\n<p style=\"text-align:center\"><a href=\"https:\/\/x.com\/HuntressLabs\/status\/2044882115574091960\" target=\"_blank\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" alt=\"Huntress Labs tweet\" height=\"410\" src=\"https:\/\/www.newsbeep.com\/uk\/wp-content\/uploads\/2026\/04\/Huntress_Labs_tweet.png\" width=\"678\"\/><\/a><\/p>\n<p>\u200bTwo zero-days still waiting for a patch<\/p>\n<p>While Microsoft is now tracking the BlueHammer vulnerability as CVE-2026-33825 and has patched it in the April 2026 security updates, the other two flaws remain unaddressed.<\/p>\n<p>As <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/new-microsoft-defender-redsun-zero-day-poc-grants-system-privileges\/\" target=\"_blank\" rel=\"nofollow noopener\">BleepingComputer previously reported<\/a>, attackers can use the RedSun exploit to gain SYSTEM privileges on Windows 10, Windows 11, and Windows Server 2019 and later systems when Windows Defender is enabled, even after applying the April Patch Tuesday patches.<\/p>\n<p>&#8220;When Windows Defender realizes that a malicious file has a cloud tag, for whatever stupid and hilarious reason, the antivirus that&#8217;s supposed to protect decides that it is a good idea to just rewrite the file it found again to it&#8217;s original location,&#8221; <a href=\"https:\/\/github.com\/Nightmare-Eclipse\/RedSun\" target=\"_blank\" rel=\"nofollow noopener\">the researcher explained<\/a>. &#8220;The PoC abuses this behaviour to overwrite system files and gain administrative privileges.&#8221;<\/p>\n<p>&#8220;Microsoft has a customer commitment to investigate reported security issues and update impacted devices to protect customers as soon as possible,&#8221; a Microsoft spokesperson told BleepingComputer earlier this week\u00a0when contacted for more information on the disclosure issues reported by the anonymous researcher.<\/p>\n<p>&#8220;We also support coordinated vulnerability disclosure, a widely adopted industry practice that helps ensure issues are carefully investigated and addressed before public disclosure, supporting both customer protection and the security research community.&#8221;<\/p>\n<p>        <a href=\"https:\/\/hubs.li\/Q04crVgD0\" target=\"_blank\" rel=\"noopener sponsored nofollow\"><br \/>\n            <img decoding=\"async\" alt=\"tines\" src=\"https:\/\/www.newsbeep.com\/uk\/wp-content\/uploads\/2026\/04\/autonomous-validation2.jpg\" class=\"b-lazy\"\/><\/a><\/p>\n<p>AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.<\/p>\n<p>At the Autonomous Validation Summit (May 12 &amp; 14), see how autonomous, context-rich validation finds what&#8217;s exploitable, proves controls hold, and closes the remediation loop.<\/p>\n<p>        <a href=\"https:\/\/hubs.li\/Q04crVgD0\" target=\"_blank\" rel=\"noopener sponsored nofollow\">Claim Your Spot<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Threat actors are exploiting three recently disclosed Windows security vulnerabilities in attacks aimed at gaining SYSTEM or elevated&hellip;\n","protected":false},"author":2,"featured_media":535759,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[59,86,56,54,55],"class_list":{"0":"post-535758","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-gb","9":"tag-technology","10":"tag-uk","11":"tag-united-kingdom","12":"tag-unitedkingdom"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/posts\/535758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/comments?post=535758"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/posts\/535758\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/media\/535759"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/media?parent=535758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/categories?post=535758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/tags?post=535758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}