Over 1 billion Windows users
A security researcher, using the alias "Chaotic Eclipse," has publicly released a proof-of-concept (PoC) exploit for a new, unpatched Microsoft Windows zero-day vulnerability. The exploit, named "BlueHammer," is a Local Privilege Escalation (LPE) flaw that allows an attacker with basic user access to gain full NT AUTHORITY\SYSTEM privileges, effectively taking complete control of a machine. The researcher released the code on GitHub on April 3, 2026, after an apparent disagreement with the Microsoft Security Response Center (MSRC). The exploit has been confirmed to work on fully patched versions of Windows 10, Windows 11, and Windows Server, placing billions of users at immediate risk from ransomware and APT groups who are expected to rapidly weaponize the public code.
NT AUTHORITY\SYSTEM.Unlike traditional memory corruption bugs, BlueHammer is a design flaw that chains together several legitimate Windows features in an unintended way. The attack combines a Time-of-Check-to-Time-of-Use (TOCTOU) race condition with a path confusion issue, abusing the interaction between the Microsoft Defender update process, the Volume Shadow Copy Service (VSS), and the Windows Cloud Files API.
The exploit is publicly available and functional. Multiple independent security researchers, including Will Dormann of Tharros and analysts from Cyderes, have verified that the PoC works as described. While Microsoft has reportedly pushed a Defender signature to detect the specific compiled binary released by the researcher, this is a trivial defense. Attackers can simply recompile the code or modify it slightly to bypass this signature-based detection, while the underlying vulnerability remains unpatched and exploitable.
The public release of a functional exploit for an unpatched LPE is a critical event. Ransomware operators frequently use LPEs as a key part of their attack chain to gain administrative rights needed to disable security software and deploy their encryptor across a network.
Successful exploitation of BlueHammer allows an attacker who has already gained an initial foothold on a system (e.g., via a phishing email) to become the system administrator. This enables them to:
The availability of this exploit significantly lowers the bar for attackers to achieve full compromise of a Windows machine.
Detecting the exploitation of a logic bug like BlueHammer is challenging because it uses legitimate system processes. However, hunting can focus on the anomalous interaction between these processes.
| Type | Value | Description |
|---|---|---|
| command_line_pattern | vssadmin.exe create shadow |
The exploit abuses the Volume Shadow Copy Service. A low-privilege user creating shadow copies is highly anomalous. |
| file_path | C:\Windows\Temp\<random_guid>\ |
The exploit involves creating temporary directories and symbolic links in unusual locations. Monitor for suspicious file system operations. |
| process_name | TiWorker.exe or TrustedInstaller.exe |
The exploit may interact with the Windows Update service. Look for these processes accessing unexpected files or being manipulated by low-privilege users. |
| event_id | 4656 and 4663 | Windows Security Event IDs for object access. Look for anomalous access patterns to the SAM file (C:\Windows\System32\config\SAM). |
Since there is no patch, detection is the primary defense.
vssadmin commands or file manipulation commands being run by non-administrative user accounts.D3FEND Reference: Detection of this LPE relies on advanced endpoint analytics, such as D3-PA - Process Analysis to spot the anomalous process chain and D3-SFA - System File Analysis to detect tampering with critical system files.
With no patch available, mitigation focuses on limiting the opportunity for exploitation.
D3FEND Reference: While waiting for a patch (D3-SU - Software Update), hardening measures like D3-UAP - User Account Permissions and execution prevention via D3-EAL - Executable Allowlisting are the most effective compensating controls.
BlueHammer patched as CVE-2026-33825. Two new zero-days, 'RedSun' (LPE) and 'UnDefend' (Defender bypass), are now actively exploited.
Use an EDR with behavioral analytics to detect the anomalous sequence of actions used by the exploit, such as a low-privilege user creating shadow copies.
Use application control solutions like AppLocker to prevent the initial malware that would use this exploit from running in the first place.
Strictly limiting and monitoring the use of privileged accounts reduces the impact of a successful escalation.
Since BlueHammer is a logic bug that abuses legitimate Windows components, signature-based detection is ineffective. The best defense is behavioral analysis. Specifically, Resource Access Pattern Analysis can be used to detect the exploit's anomalous behavior. A security system (like an EDR) should be configured to understand that a low-privilege user process should never be creating Volume Shadow Copies (vssadmin.exe) and then attempting to access or manipulate files in C:\Windows\System32\. This sequence is highly irregular. By baselining normal user and system behavior, an EDR can flag the BlueHammer exploit chain as a deviation. For example, an alert could be triggered when a process running under a standard user context initiates a call to the VSS service and subsequently performs file operations in a system-protected directory. This focuses on the 'what' and 'how' of the action, not just the 'who', making it effective against this type of logic-based attack.
While waiting for a patch from Microsoft, a strong compensating control is Executable Allowlisting, such as Windows AppLocker or a third-party tool. The BlueHammer exploit is a Local Privilege Escalation (LPE), meaning an attacker must first execute code on the system to use it. By implementing a strict allowlisting policy, you can prevent the initial payload (e.g., from a phishing email or malicious download) from running. If the attacker's initial code cannot execute, they never get the opportunity to run the BlueHammer exploit to escalate their privileges. This technique hardens the endpoint by moving from a default-allow to a default-deny posture, significantly raising the bar for attackers. While it requires careful implementation to avoid disrupting legitimate business operations, it is one of the most effective controls against the execution of unauthorized code, which is a prerequisite for this exploit.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats