Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Researcher drops two more Microsoft Defender zero-days, all three now exploited in the wild
    Cybersecurity

    Researcher drops two more Microsoft Defender zero-days, all three now exploited in the wild

    adminBy adminApril 18, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    New Defender deployment tool streamlines Windows device onboarding with single executable
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The security researcher who earlier this month published a proof-of-concept (PoC) exploit for a zero-day privilege escalation vulnerability in Microsoft Defender is back with two more.

    The first, dubbed “RedSun,” is another privilege escalation flaw in the same platform. The second, “UnDefend,” allows a standard user to block Microsoft Defender from receiving signature updates or disable it entirely (if Microsoft pushes a major Defender update).

    And, according to Huntress researchers, all three exploitation techniques have been leveraged in the wild by at least one threat actor.

    The new exploits

    The researcher, who goes by Chaotic Eclipse and Nightmare Eclipse, released the BlueHammer PoC on April 3, after claiming that a disclosure attempt with the Microsoft Security Response Center went nowhere.

    On April 14, Microsoft pushed out security updates that fixed the vulnerability, which received the CVE-2026-33825 identifier. The researchers credited with reporting it – Zen Dodd and Yuanpei Xu – are not “Nightmare Eclipse”.

    On April 16, this currently anonymous researcher published the “RedSun” and “UnDefend” PoC exploits to the same GitHub repository, which remains accessible despite a warning from the Microsoft-owned platform:

    Microsoft Defender zero-days exploited

    The effectiveness of the RedSun PoC has been confirmed by vulnerability analyst Will Dormann.

    Attacks in the wild

    Huntress researchers say that they’ve observed the BlueHammer exploit being blocked by Windows Defender on April 10. On April 16, they also observed the “RedSun” and “UnDefend” PoCs being used.

    The attacker dropped the exploit files into the user’s Pictures and Downloads folders and renamed them to avoid suspicion. Then, before launching the exploits, they ran commands to map out user privileges, discovered stored credentials, and the Active Directory structure.

    “Huntress has isolated the affected organization to prevent further post-exploitation,” the researchers added.

    The ball is now in Microsoft’s court: with the next Patch Tuesday many weeks away, an out-of-band emergency patch looks like the most likely path forward.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    Defender Drops Exploited Microsoft Researcher Wild ZeroDays
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article5 things Claude’s free tier does better than Gemini, ChatGPT, and Perplexity for productivity users who live in documents
    Next Article Equinix offering targets automated AI-centric network operations
    admin
    • Website

    Related Posts

    Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

    April 18, 2026

    $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

    April 18, 2026

    CISA flags Apache ActiveMQ flaw as actively exploited in attacks

    April 18, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Dive Into The Stanford Report Data

    April 18, 2026

    Claude Cowork took one repetitive task for me, and I’m very impressed

    April 18, 2026

    Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

    April 18, 2026

    ConnectBot v1.10.4 by Kenny Root

    April 18, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,383)
    • Privacy & Online Earning (171)
    • SEO & Digital Marketing (847)
    • Tech Tools & Mobile / Apps (1,653)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Dive Into The Stanford Report Data

    April 18, 2026

    Claude Cowork took one repetitive task for me, and I’m very impressed

    April 18, 2026

    Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

    April 18, 2026
    Most Popular
    • Dive Into The Stanford Report Data
    • Claude Cowork took one repetitive task for me, and I’m very impressed
    • Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks
    • ConnectBot v1.10.4 by Kenny Root
    • AI traffic converts better than non-AI visits for U.S. retailers: Report
    • Horizon Lock on the Galaxy S26 Ultra is amazing, but Motorola did it first. Here’s how they compare
    • $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims
    • This hidden Samsung Galaxy S26 feature has changed how I watch Netflix and YouTube on the move
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.