DMR News

Advancing Digital Conversations

Hackers Exploit Newly Disclosed Windows Vulnerabilities After Researcher Publishes Attack Code Online

ByJolyen

Apr 20, 2026

Hackers Exploit Newly Disclosed Windows Vulnerabilities After Researcher Publishes Attack Code Online

Hackers have begun exploiting multiple Windows vulnerabilities after a security researcher publicly released working exploit code, with cybersecurity analysts confirming at least one organization has already been compromised.

Huntress Identifies Active Exploitation Of Three Flaws

Huntress reported that attackers are using three vulnerabilities—BlueHammer, UnDefend, and RedSun—to gain unauthorized access to systems.

Researchers said the attacks rely on publicly available exploit code, though the identity of the attackers and the targeted organization remains unclear.

Only One Vulnerability Patched So Far

Of the three flaws, only BlueHammer has received a patch from Microsoft, which released a fix earlier in the week. The remaining vulnerabilities, UnDefend and RedSun, are still unpatched.

All three issues affect Windows Defender, Microsoft’s antivirus system, and can allow attackers to gain high-level or administrator access to affected machines.

Researcher Published Exploit Code Following Dispute

A researcher operating under the name Chaotic Eclipse published exploit code for the vulnerabilities on a personal blog and GitHub repository over the past two weeks.

The researcher indicated that the disclosure followed a dispute with Microsoft, referencing the company’s Microsoft Security Response Center in public posts.

Initial code for BlueHammer was released earlier in the month, followed by UnDefend and RedSun in subsequent days.

Full Disclosure Accelerates Risk Of Real World Attacks

The incident reflects a practice known as “full disclosure,” where vulnerability details—and sometimes working exploit code—are released publicly before fixes are available.

While coordinated disclosure typically allows vendors time to address issues before publication, breakdowns in that process can lead to immediate risk, as attackers gain access to ready-made tools.

Defenders Race To Respond To Public Exploits

John Hammond said the availability of exploit code creates urgency for defenders, who must respond quickly to prevent misuse.

He noted that such scenarios create a “tug-of-war” dynamic, where defenders attempt to mitigate threats while attackers rapidly adopt newly released tools.

Microsoft stated that it supports coordinated vulnerability disclosure practices, which aim to balance transparency with user protection.


Featured image credits: Roboflow Universe

For more stories like it, click the +Follow button at the top of this page to follow us.

Jolyen

As a news editor, I bring stories to life through clear, impactful, and authentic writing. I believe every brand has something worth sharing. My job is to make sure it’s heard. With an eye for detail and a heart for storytelling, I shape messages that truly connect.

Leave a Reply

Your email address will not be published. Required fields are marked *