{"id":12788,"date":"2026-04-21T12:19:18","date_gmt":"2026-04-21T12:19:18","guid":{"rendered":"https:\/\/www.securitytoday.de\/2026\/04\/23\/windows-defender-under-fire-bluehammer-and-redsun-exploited\/"},"modified":"2026-04-24T17:34:46","modified_gmt":"2026-04-24T17:34:46","slug":"windows-defender-under-fire-bluehammer-and-redsun-exploited","status":"publish","type":"post","link":"https:\/\/www.securitytoday.de\/en\/2026\/04\/21\/windows-defender-under-fire-bluehammer-and-redsun-exploited\/","title":{"rendered":"Windows Defender Under Fire: BlueHammer and RedSun Exploited Since April\u202f16"},"content":{"rendered":"<p style=\"color:#69d8ed;font-size:0.9em;margin:0 0 16px;padding:0;\">5 min. read<\/p>\n<div style=\"color:#888;font-size:0.85em;margin:0 0 16px;\"><span class=\"article-date\">As of: April 2026<\/span> (21.04.2026)<\/div>\n<p><strong>Windows Defender has been under active attack since 16 April 2026. The two privilege escalation vulnerabilities BlueHammer (CVE-2026-33825) and RedSun, disclosed on April Patch Tuesday, are now being exploited in real-world incidents. Attackers are chaining the exploits with UnDefend to establish persistence, dump credentials, move laterally, and deploy ransomware. For security teams at DACH organisations, this represents the highest urgency level seen in months.<\/strong><\/p>\n<div style=\"background:#003340;color:#fff;padding:32px 36px;margin:32px 0;border-radius:8px;\">\n<p style=\"margin:0 0 18px 0;font-size:0.95em;font-weight:800;text-transform:uppercase;letter-spacing:0.2em;color:#69d8ed;border-bottom:2px solid rgba(105,216,237,0.25);padding-bottom:12px;\">Key Takeaways<\/p>\n<ul style=\"margin:0;padding-left:22px;color:rgba(255,255,255,0.92);line-height:1.6;\">\n<li style=\"margin-bottom:12px;\"><strong style=\"color:#69d8ed;\">Two zero-days in Windows Defender.<\/strong> BlueHammer (CVE-2026-33825, patched 14.04.) and the subsequently released RedSun exploit both target privilege escalation via a TOCTOU (Time-of-Check to Time-of-Use) race condition in the Threat Remediation Engine.<\/li>\n<li style=\"margin-bottom:12px;\"><strong style=\"color:#69d8ed;\">Active exploitation since 16.04.<\/strong> Threat intelligence feeds are documenting campaigns that chain BlueHammer, RedSun, and UnDefend. The result: persistence, credential dumping, ransomware deployment, and lateral movement.<\/li>\n<li><strong style=\"color:#69d8ed;\">April Patch Tuesday with 167 fixes.<\/strong> The April rollup closes 167 vulnerabilities, including two zero-days. Organisations that have not yet patched are days away from active exploitation.<\/li>\n<\/ul>\n<\/div>\n<p style=\"font-size:0.88em;color:#666;margin:20px 0 32px 0;border-top:1px solid #e5e5e5;border-bottom:1px solid #e5e5e5;padding:10px 0;\"><span style=\"color:#004a59;font-weight:700;text-transform:uppercase;font-size:0.72em;letter-spacing:0.14em;margin-right:14px;\">Related<\/span><a href=\"https:\/\/www.securitytoday.de\/en\/2026\/04\/14\/bsi-warns-on-f5-big-ip-citrix-netscaler-and-trivy-april-2026\/\" style=\"color:#333;text-decoration:underline;\">BSI warns on F5 BIG-IP, Citrix and Trivy: operational steps<\/a>&nbsp;&nbsp;<span style=\"color:#ccc;\">\/<\/span>&nbsp;&nbsp;<a href=\"https:\/\/www.securitytoday.de\/en\/2026\/04\/23\/ransomware-playbook-2026-what-security-teams-really-decide\/\" style=\"color:#333;text-decoration:underline;\">Ransomware Playbook: 72 Hours<\/a><\/p>\n<h2>What BlueHammer and RedSun mean technically<\/h2>\n<p><strong>What is BlueHammer?<\/strong> BlueHammer is the public name for zero-day CVE-2026-33825 in Windows Defender. Technically, it is a TOCTOU race condition in the Threat Remediation Engine. A local attacker exploits the window between the check and the processing of a file classified as malicious to escalate their own privileges to SYSTEM level.<\/p>\n<p>The exploit was published on 7 April 2026, before Microsoft had rolled out a patch. April Patch Tuesday (14.04.) closed CVE-2026-33825. Two days later, the same researcher published a second exploit, RedSun, which the author described as a protest against Microsoft&#8217;s disclosure process. RedSun exploits a related vulnerability that was not fully addressed in the April patch. UnDefend, finally, is a supplementary tool that bypasses Defender monitoring itself.<\/p>\n<h2>Why attackers operationalized this so quickly<\/h2>\n<p>From an attacker&#8217;s perspective, the BlueHammer plus RedSun plus UnDefend combination is close to perfect. The local privilege escalation path works on a large share of Windows endpoints that haven&#8217;t been fully patched in the past 14 days. Attackers bypass EDR telemetry because UnDefend disables the detection components. They then dump credentials from LSASS, move laterally, and deploy their payload \u2014 typically ransomware.<\/p>\n<p>Threat intelligence feeds from Europe and the United States have consistently reported incidents in the financial sector, healthcare, and manufacturing since April 16. Germany&#8217;s BSI has not yet issued an official advisory of its own; coordination is running through CERT-Bund channels to the affected sectors. The next 48 to 72 hours will determine how broadly the wave spreads. Several threat intelligence firms report that Russia-linked ransomware groups have already integrated the combination into their attack kits, accelerating its adoption.<\/p>\n<p>The case illustrates how tightly disclosure cycles and active exploitation are coupled in 2026. In this instance, roughly nine days elapsed between the public proof-of-concept release and the first active campaign. Three years ago, that window was three to six weeks. The shrinking timeframe poses fundamental questions for traditional patch management processes. Out-of-band patches and automated deployment pipelines are no longer luxury features \u2014 they are operational necessities.<\/p>\n<div class=\"evm-stat evm-stat-highlight\" style=\"text-align:center;background:#003340;border-radius:12px;padding:32px 24px;margin:32px 0;\">\n<div style=\"font-size:48px;font-weight:700;color:#fff;letter-spacing:-0.03em;\">167 CVEs<\/div>\n<div style=\"font-size:15px;color:#fff;margin-top:8px;max-width:480px;margin-left:auto;margin-right:auto;line-height:1.5;\">Total scope of the Microsoft April 2026 Patch Tuesday rollout. Two of them are zero-days; several others carry privilege escalation potential. Prioritized patch rounds are mandatory.<\/div>\n<div style=\"font-size:12px;color:#69d8ed;margin-top:12px;\">Source: Microsoft Security Response Center, April 2026 Patch Tuesday Summary.<\/div>\n<\/div>\n<h2>What Security Teams Should Do in the Next 72 Hours<\/h2>\n<div class=\"pros-cons\" style=\"display:grid;grid-template-columns:repeat(auto-fit,minmax(280px,1fr));gap:16px;margin:28px 0;\">\n<div style=\"background:#fafafa;border-top:3px solid #c0392b;padding:18px 20px;border-radius:4px;\">\n<p style=\"margin:0 0 10px 0;font-size:0.78em;font-weight:700;text-transform:uppercase;letter-spacing:0.12em;color:#c0392b;\">Immediate Priorities<\/p>\n<ul style=\"margin:0;padding-left:18px;color:#333;line-height:1.55;font-size:0.95em;\">\n<li style=\"margin-bottom:6px;\">Verify patch status across all Windows endpoints<\/li>\n<li style=\"margin-bottom:6px;\">Force April Patch Tuesday deployment, including on lagging clients<\/li>\n<li style=\"margin-bottom:6px;\">Check EDR telemetry for Defender service stops<\/li>\n<li>Pull the incident response playbook from the archive<\/li>\n<\/ul>\n<\/div>\n<div style=\"background:#fafafa;border-top:3px solid #2d7a3e;padding:18px 20px;border-radius:4px;\">\n<p style=\"margin:0 0 10px 0;font-size:0.78em;font-weight:700;text-transform:uppercase;letter-spacing:0.12em;color:#2d7a3e;\">Medium-Term Hardening<\/p>\n<ul style=\"margin:0;padding-left:18px;color:#333;line-height:1.55;font-size:0.95em;\">\n<li style=\"margin-bottom:6px;\">Host hardening against LSASS dumping (Credential Guard)<\/li>\n<li style=\"margin-bottom:6px;\">Activate alerts for UnDefend indicators in your SIEM<\/li>\n<li style=\"margin-bottom:6px;\">Review lateral movement controls and network segmentation<\/li>\n<li>Evaluate a second EDR alongside Defender for defense-in-depth<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p>The single most important immediate action is patch velocity. April Patch Tuesday is still mid-rollout at many organizations \u2014 deployment waves typically take 7 to 14 days. In the current threat environment, that cycle is too long. CISOs should work with their client management teams to stand up an emergency wave that forces the April rollup to all endpoints. Anyone still sitting at the March patch level has an acute problem.<\/p>\n<p>Running a hunting sweep over endpoint telemetry in parallel with the patch wave is well worth the effort. Defender service stops, unexpected LSASS access, and anomalous SYSTEM-level processes are the signals that reveal attackers right now. Sentinel customers have prebuilt analytics rules for exactly this; CrowdStrike enabled IOA detections in its April update. For teams without a dedicated threat hunter, a two-hour sweep across the last seven days is enough to surface suspicious patterns.<\/p>\n<p>Finally, there is an organizational point that matters. BlueHammer and RedSun have demonstrated that exploit releases ahead of patches will be more common in 2026. The classic Patch Tuesday cadence is no longer a safe assumption. Security teams should work with client management and leadership to define a standing rule that permits out-of-band patch rollouts when zero-days are actively exploited. Organizations that have not documented this decision in advance will lose days in approval chains they simply cannot afford.<\/p>\n<h2>Frequently Asked Questions<\/h2>\n<h3>How do I detect attacks using BlueHammer or RedSun?<\/h3>\n<p>Indicators of compromise include unusual Defender service stops, unexpected SYSTEM-level processes with parent processes originating in user sessions, and clustered LSASS access shortly after login events. Threat intelligence providers including CrowdStrike, Microsoft Defender for Endpoint, and Sentinel have already incorporated these patterns into current detection rules. Running a custom hunt in your SIEM against these signatures is worthwhile right now.<\/p>\n<h3>What should I do if the April patch has not yet rolled out across the organization?<\/h3>\n<p>Accelerate the deployment wave immediately. Standard rollout timelines are not suited to the current threat landscape. If a patch is delayed for compatibility reasons, temporary workarounds are documented in the relevant Microsoft advisories. In the meantime, reinforce network segmentation and Zero Trust access controls at critical chokepoints.<\/p>\n<h3>Does this attack affect servers, or only Windows clients?<\/h3>\n<p>Primarily clients, since the attack path requires an active user session. However, Windows servers running interactive logins or Terminal Services are equally in scope. Defender for Servers and the corresponding Azure counterparts carry the relevant patches, though server rollout prioritization is often weaker than on the client side.<\/p>\n<h2 style=\"padding-top:64px;margin-bottom:20px;\">More from the MBF Media Network<\/h2>\n<div style=\"margin:40px 0 24px 0;\">\n<div style=\"padding:14px 18px;border-left:3px solid #0bb7fd;background:#fafafa;margin-bottom:6px;\">\n<div style=\"font-size:0.7em;font-weight:700;color:#0bb7fd;text-transform:uppercase;letter-spacing:0.12em;margin-bottom:4px;\">cloudmagazin<\/div>\n<p><a href=\"https:\/\/www.cloudmagazin.com\/2026\/04\/21\/kubernetes-1-36-release-april-2026-user-namespaces-ingress-nginx\/\" style=\"font-weight:600;line-height:1.4;color:#1a1a1a;text-decoration:none;\">Kubernetes 1.36: User Namespaces Stable, Ingress-NGINX Retired<\/a>\n<\/div>\n<div style=\"padding:14px 18px;border-left:3px solid #202528;background:#fafafa;margin-bottom:6px;\">\n<div style=\"font-size:0.7em;font-weight:700;color:#202528;text-transform:uppercase;letter-spacing:0.12em;margin-bottom:4px;\">mybusinessfuture<\/div>\n<p><a href=\"https:\/\/mybusinessfuture.com\/bitkom-ki-studie-2026-41-prozent-unternehmen-mittelstand\/\" style=\"font-weight:600;line-height:1.4;color:#1a1a1a;text-decoration:none;\">Bitkom AI Study 2026: 41 Percent of Companies Use AI<\/a>\n<\/div>\n<div style=\"padding:14px 18px;border-left:3px solid #d65663;background:#fafafa;\">\n<div style=\"font-size:0.7em;font-weight:700;color:#d65663;text-transform:uppercase;letter-spacing:0.12em;margin-bottom:4px;\">digital-chiefs<\/div>\n<p><a href=\"https:\/\/www.digital-chiefs.de\/gartner-it-spending-prognose-2026-cio-budget-einordnung\/\" style=\"font-weight:600;line-height:1.4;color:#1a1a1a;text-decoration:none;\">Gartner Forecast 2026: IT Spending Reaches 6.150 Billion<\/a>\n<\/div>\n<\/div>\n<p style=\"text-align:right;\"><em>Image source: Pexels \/ Tima Miroshnichenko (px:5380664)<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"BlueHammer (CVE-2026-33825) and RedSun in Windows Defender have been actively exploited since April 16. What security teams need to do now.","protected":false},"author":10,"featured_media":12561,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Windows Defender under attack: BlueHammer (CVE-2026-33825) and RedSun actively exploited since Apr 16. Prioritize patching and IOC hunting now. Windows Defender under attack: BlueHammer (CVE-2026-33825) and RedSun actively exploited since Apr 16. Prioritize patch rollout + IOC hunting.","_yoast_wpseo_meta-robots-noindex":"","_yoast_wpseo_meta-robots-nofollow":"","_yoast_wpseo_meta-robots-adv":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"","_yoast_wpseo_opengraph-image-id":"","_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"","_yoast_wpseo_twitter-image-id":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-12788","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aktuelles"],"wpml_language":"en","wpml_translation_of":12562,"_links":{"self":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/12788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/comments?post=12788"}],"version-history":[{"count":1,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/12788\/revisions"}],"predecessor-version":[{"id":12924,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/12788\/revisions\/12924"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media\/12561"}],"wp:attachment":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media?parent=12788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/categories?post=12788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/tags?post=12788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}