A threat actor known as Nightmare-Eclipse has been actively releasing a series of six zero-day exploits targeting Microsoft Windows. This campaign, described by researchers as a retaliatory act against Microsoft, poses a severe threat to users globally. The exploits include privilege escalation vulnerabilities in components like Windows Defender and the Windows Cloud Files Mini Filter Driver. One patched vulnerability, CVE-2026-33825 ("BlueHammer"), and several unpatched ones, including "MiniPlasma," have been demonstrated to grant SYSTEM-level access on fully patched Windows 11 systems. This deliberate leak of powerful exploit code dramatically lowers the barrier for other malicious actors to compromise Windows systems, increasing the urgency for users to apply all available patches and for Microsoft to address the unpatched flaws.
The campaign involves a collection of six exploits, some patched and some reportedly still zero-days:
cldflt.sys). This flaw was supposedly fixed in 2020, but the actor's proof-of-concept allegedly works on fully patched Windows 11 systems as of May 2026, indicating a failed patch or a new variant of the bug.The threat actor 'Nightmare-Eclipse' is actively releasing these exploits to the public. While the actor's motivation seems to be notoriety and retaliation, the public release of functional exploit code means that other, more financially motivated threat actors (such as ransomware groups) can quickly weaponize these tools and incorporate them into their own attacks. The risk of in-the-wild exploitation by third parties is therefore extremely high.
The release of multiple privilege escalation zero-days is a critical security event. Privilege escalation is a key stage in most successful cyberattacks. It allows an attacker who gained an initial foothold with low privileges (e.g., through a phishing email) to become the all-powerful SYSTEM administrator. With SYSTEM access, an attacker can:
The following patterns may help identify systems where these exploits are being used:
MsMpEng.exe (Windows Defender): The Defender service should not be spawning unusual processes like cmd.exe or powershell.exe.cldflt.sys: Monitor for crashes or unexpected behavior from the Cloud Files Mini Filter Driver.WinDefend) have been stopped or tampered with should be investigated immediately.lsass.exe.4688 (Process Creation) for suspicious parent-child process relationships. Monitor Event ID 4672 (Special Privileges Assigned to New Logon) for unexpected privilege assignments.Apply all available security updates from Microsoft immediately, especially the patch for CVE-2026-33825.
Mapped D3FEND Techniques:
Use application control and behavioral blocking to prevent the execution of the initial malware that would leverage these exploits.
Mapped D3FEND Techniques:
Ensure endpoint security solutions are enabled and configured to use behavioral detection to identify exploit-like activity.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.