_research / microsoft-defender-zero-days-bluehammer-redsun-undefend-exploited
RESEARCH ANALYSIS 7 min read PREMIUM

BlueHammer, RedSun, UnDefend: Three Defender Zero-Days Weaponized in Active Privilege Escalation Campaign

Threat actors are actively exploiting three Microsoft Defender zero-days — two still unpatched — to escalate privileges on compromised systems. Here's what defenders need to know now.

2026-04-18 · Source: The Hacker News
🔬
RESEARCH ANALYSIS

This analysis is based on research published by The Hacker News. CypherByte adds analysis, context, and security team recommendations.

Source: Original threat intelligence informed by reporting from The Hacker News. Underlying vulnerability research attributed to security researcher Chaotic Eclipse. Analysis and perspective are original CypherByte research.

Executive Summary

Three critical privilege escalation vulnerabilities residing within Microsoft Defender — codenamed BlueHammer, RedSun, and UnDefend — are being actively weaponized by threat actors against compromised Windows environments. According to research flagged by Huntress and originally disclosed by the researcher known as Chaotic Eclipse, all three flaws were released publicly as zero-days, meaning no coordinated patch cycle preceded their exposure. As of this writing, two of the three vulnerabilities remain unpatched by Microsoft, leaving hundreds of millions of endpoints in a state of unmitigated risk. Security teams operating in enterprise, government, and critical infrastructure environments should treat this as an active incident-response priority, not a scheduled patch management item.

What makes this cluster of vulnerabilities particularly alarming is not merely their individual severity, but the strategic target they share: Microsoft Defender — the default endpoint protection layer baked into every modern Windows installation. When the security tool itself becomes the attack surface, defenders are robbed of their most fundamental assumption: that the antivirus layer can be trusted. Organizations that have leaned heavily on Defender as their primary or sole endpoint detection capability face compounded exposure. This analysis is essential reading for SOC analysts, incident responders, endpoint security architects, and CISOs making real-time risk decisions.

⚠ CypherByte Threat Level: CRITICAL
Active exploitation confirmed. Two of three vulnerabilities carry no available patch. Affected surface: all Windows systems running Microsoft Defender with default configurations. Recommended posture: assume breach-capable exposure until mitigations are validated.

Technical Analysis

The three vulnerabilities — BlueHammer, RedSun, and UnDefend — each represent a distinct exploitation pathway within the Microsoft Defender stack, though they share a common outcome: local privilege escalation (LPE) enabling attackers to move from standard or restricted user contexts to SYSTEM-level authority on affected machines.

BlueHammer (access via authenticated researcher portal) is described as the most technically sophisticated of the three. Based on available research indicators, it appears to exploit a flaw in how Defender's kernel-level components handle certain memory operations during real-time protection scanning routines. By crafting a malicious input that triggers a race condition in the scan engine's privileged execution thread, an attacker with low-privilege local access can corrupt memory in a controlled manner — a classic TOCTOU (Time-of-Check to Time-of-Use) variant — ultimately redirecting execution flow into a SYSTEM context. BlueHammer's complexity suggests it was likely developed or refined by a well-resourced actor before Chaotic Eclipse's public disclosure.

RedSun targets what appears to be an insecure privileged service interaction within Defender's update and definition management subsystem. Defender's background update service operates with elevated privileges by design, and RedSun exploits an insufficient validation flaw in how this service processes certain locally-accessible configuration or task inputs. An attacker can submit a specially crafted payload to this service interface — accessible without administrative rights — to coerce the privileged process into executing attacker-controlled code. This is a privilege escalation via privileged service abuse pattern, well-established in the threat landscape but particularly impactful when deployed against a universally present security component.

UnDefend lives up to its name. This vulnerability appears to exploit Defender's own exclusion and policy enforcement mechanisms — the very features designed to grant administrators control over scan behavior — to carve out a protected execution space for attacker payloads. By abusing legitimate Defender API calls or registry-based policy interfaces accessible at a lower privilege level than intended, an attacker can instruct Defender to ignore specific processes or directories, effectively neutering detection capability while simultaneously leveraging the interaction to gain elevated execution rights. The irony is sharp: the tool's own administrative surface is weaponized to both elevate privileges and blind the system to subsequent malicious activity.

🔍 Key Technical Finding: All three vulnerabilities require only local, low-privilege access as a precondition — meaning they are post-initial-access tools. Their value to threat actors lies in privilege escalation chains: pair any of these with a phishing-delivered dropper or a web-based initial access exploit, and an attacker achieves full SYSTEM control with high reliability.

Impact Assessment

Affected systems include any Windows endpoint or server running Microsoft Defender with real-time protection enabled — which, by default, encompasses the vast majority of the global Windows install base. This includes Windows 10, Windows 11, and Windows Server variants where Defender has not been explicitly replaced by a third-party endpoint solution. Enterprise environments using Microsoft Defender for Endpoint (the commercial EDR tier) may have additional telemetry advantages but are not inherently immune to the underlying OS-level privilege escalation mechanics.

The real-world consequences of active exploitation are severe and multi-layered. At the most immediate level, SYSTEM-level privilege grants attackers complete control over affected machines: credential harvesting via LSASS dumping, disabling of security controls, lateral movement facilitation, ransomware deployment, and persistent backdoor installation all become trivially achievable post-exploitation. At a systemic level, the fact that Defender itself is the vehicle for both escalation (BlueHammer, RedSun) and evasion (UnDefend) means that Defender's own telemetry and alerting pipelines cannot be fully trusted on a compromised host — a particularly dangerous blind spot for organizations without supplementary EDR visibility.

Critical infrastructure sectors — healthcare, finance, energy, and government — face disproportionate risk, particularly those operating large Windows fleets with standardized Defender deployments and limited additional endpoint controls. Ransomware operators and nation-state actors are the threat profiles most likely to operationalize these vulnerabilities at scale, given the effort required for reliable exploitation of BlueHammer in particular.

CypherByte's Perspective

The BlueHammer/RedSun/UnDefend cluster is a stark reminder of a principle that security architects often acknowledge but rarely fully operationalize: security software is software, and software has vulnerabilities. The attack surface of endpoint protection tools is expansive — they run at high privilege, they interact with every process on the system, they parse untrusted content at scale, and they expose rich API surfaces for management and policy control. This makes them among the highest-value targets for sophisticated adversaries. When a researcher of Chaotic Eclipse's apparent capability turns full attention to a platform as ubiquitous as Microsoft Defender, the result is exactly what we're seeing: a cascade of exploitable findings released without coordinated disclosure.

The zero-day release methodology employed here — publishing without prior vendor notification or patch availability — is a genuinely contested practice in the security research community. Regardless of one's position on that debate, the operational reality for defenders is identical: the vulnerabilities exist, they are public, and they are being exploited now. The responsible path forward is aggressive mitigation, not philosophical debate. CypherByte recommends treating any environment with unverified Defender configurations as potentially compromised and applying the detection and response actions outlined below immediately.

Indicators and Detection

Given that UnDefend specifically targets Defender's own detection pipeline, defenders should prioritize external and supplementary telemetry sources over Defender-native alerts on potentially affected hosts. Key detection strategies include:

Process Integrity Monitoring: Watch for unexpected SYSTEM-context process spawning originating from Defender service binaries (MsMpEng.exe, MpCmdRun.exe, NisSrv.exe). Any child process launched from these parents in an anomalous manner — particularly shells, script interpreters, or network utilities — warrants immediate investigation.

Defender Exclusion Auditing: Audit registry paths including HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\ for unauthorized additions. Sudden appearance of exclusion entries for user-writable directories, temp paths, or specific process names is a strong indicator of UnDefend-style abuse.

Privileged Service Interaction Logging: Enable and review Windows Security Event logs for anomalous interactions with the WinDefend service, particularly any non-administrative processes attempting service control operations or definition path modifications.

LSASS Access Monitoring: Post-escalation credential theft remains a primary follow-on action. Monitor for unauthorized OpenProcess calls targeting lsass.exe from non-standard callers, particularly those that recently acquired elevated tokens.

📡 Supplementary Detection Recommendation: Organizations with SIEM infrastructure should immediately build correlation rules for the combination of: (1) new Defender exclusion entries + (2) SYSTEM-context process anomalies + (3) LSASS access attempts within a short time window. This tripwire pattern is strongly indicative of an active exploitation chain leveraging these vulnerabilities.

Recommendations

1. Apply Available Patches Immediately. For BlueHammer — which has a patch available — deploy the fix on an emergency timeline outside normal patch cycles. Prioritize internet-facing systems, servers, and high-value workstations first.

2. Implement Defense-in-Depth for Unpatched Flaws. For RedSun and UnDefend, where patches are not yet available, apply compensating controls: restrict local login access to sensitive systems, enforce application allowlisting via Windows Defender Application Control (WDAC) or AppLocker to reduce the local attacker footprint, and harden service interaction permissions where technically feasible.

3. Deploy Supplementary EDR Telemetry. Organizations relying solely on Microsoft Defender should evaluate immediate deployment of a complementary EDR solution capable of monitoring Defender's own process behavior. This is not redundancy for its own sake — it is a necessary architectural response to Defender being a confirmed attack surface.

4. Audit Defender Exclusions Enterprise-Wide. Using your endpoint management platform (Intune, SCCM, or equivalent), pull a full audit of Defender exclusion configurations across your fleet. Any exclusion not traceable to an approved IT change request should be treated as a potential indicator of compromise.

5. Elevate Monitoring on High-Value Targets. Domain controllers, credential stores, backup infrastructure, and financial systems should be placed under elevated monitoring posture immediately. These are the systems attackers will pivot to following successful privilege escalation.

6. Engage Threat Hunting Proactively. Do not wait for alerts. Issue a proactive threat hunt across your environment for the behavioral indicators described above. Assume that initial access may have already occurred via a separate vector and that these Defender vulnerabilities are being used as the escalation step in an ongoing intrusion.

7. Monitor Microsoft Security Response Center (MSRC). Subscribe to MSRC advisories and maintain readiness to deploy emergency patches for RedSun and UnDefend the moment they become available. Establish an internal SLA of under 24 hours for deployment of patches addressing actively exploited zero-days of this severity class.

CypherByte will continue monitoring this situation and will publish updated analysis as patch availability and exploitation details evolve. Threat intelligence informed by Huntress research and The Hacker News reporting. Original vulnerability research credited to Chaotic Eclipse.

// TOPICS
#research#analysis
// WANT MORE LIKE THIS?

Get full access to all research analyses, deep-dive writeups, and premium threat intelligence.