{"id":235118,"date":"2026-04-17T17:48:46","date_gmt":"2026-04-17T17:48:46","guid":{"rendered":"https:\/\/entertainment.runfyers.com\/index.php\/2026\/04\/17\/hackers-are-abusing-unpatched-windows-security-flaws-to-hack-into-organizations-techcrunch\/"},"modified":"2026-04-17T17:48:46","modified_gmt":"2026-04-17T17:48:46","slug":"hackers-are-abusing-unpatched-windows-security-flaws-to-hack-into-organizations-techcrunch","status":"publish","type":"post","link":"https:\/\/entertainment.runfyers.com\/index.php\/2026\/04\/17\/hackers-are-abusing-unpatched-windows-security-flaws-to-hack-into-organizations-techcrunch\/","title":{"rendered":"Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">Hackers have broken into at least one organization using Windows vulnerabilities published online by a disgruntled security researcher over the last two weeks, according to a cybersecurity firm.<\/p>\n<p class=\"wp-block-paragraph\">On Friday, cybersecurity company Huntress said in <a href=\"https:\/\/x.com\/HuntressLabs\/status\/2044882050314817880\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">a series of posts on X<\/a> that its researchers have seen hackers taking advantage of three Windows security flaws, dubbed BlueHammer, UnDefend, and RedSun.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">It\u2019s unclear who the target of this attack is, and who the hackers are.<\/p>\n<p class=\"wp-block-paragraph\">BlueHammer is the only bug among the three vulnerabilities being exploited that Microsoft has <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33825\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">patched<\/a> so far. A fix for BlueHammer was rolled out earlier this week.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">It appears that the hackers are exploiting the bugs by using exploit code that the security researcher published online.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Earlier this month, a researcher who goes by Chaotic Eclipse <a rel=\"nofollow\" href=\"https:\/\/t.co\/yk80ylIfBV\" target=\"_blank\">published on their blog<\/a> what they said was code to exploit an unpatched vulnerability in Windows. The researcher alluded to some conflict with Microsoft as the motivation behind publishing the code.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cI was not bluffing Microsoft and I\u2019m doing it again,\u201d they <a href=\"https:\/\/deadeclipse666.blogspot.com\/2026\/04\/public-disclosure.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">wrote<\/a>. \u201cHuge thanks to MSRC leadership for making this possible,\u201d they added, referring to Microsoft\u2019s Security Response Center, the company\u2019s team that investigates cyberattacks and handles reports of vulnerabilities.<\/p>\n<div class=\"wp-block-techcrunch-inline-cta\">\n<div class=\"inline-cta__wrapper\">\n<p>Techcrunch event<\/p>\n<div class=\"inline-cta__content\">\n<p>\n\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__location\">San Francisco, CA<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__separator\">|<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__date\">October 13-15, 2026<\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"wp-block-paragraph\">Days later, <a href=\"https:\/\/x.com\/ChaoticEclipse0\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Chaotic Eclipse<\/a> published UnDefend, and then earlier this week published RedSun. The researcher published code to exploit all three vulnerabilities on their <a href=\"https:\/\/github.com\/Nightmare-Eclipse\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">GitHub page<\/a>.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">All three vulnerabilities affect the Microsoft-made antivirus Windows Defender, allowing a hacker to gain high-level or administrator access to an affected Windows computer.<\/p>\n<p class=\"wp-block-paragraph\">TechCunch could not reach Chaotic Eclipse for comment. <\/p>\n<p class=\"wp-block-paragraph\">In response to a series of specific questions, Microsoft\u2019s communications director Ben Hope said in a statement that the company supports \u201ccoordinated vulnerability disclosure, a widely adopted industry practice that helps ensure issues are carefully investigated and addressed before public disclosure, supporting both customer protection and the security research community.\u201d<\/p>\n<p class=\"wp-block-paragraph\">This is a case of what the cybersecurity industry calls \u201cfull disclosure.\u201d When researchers find a flaw, they can report it to the affected software maker to help them fix it. At that point, usually the company acknowledges receipt, and if the vulnerability is legitimate, the company works to patch it. Often, the company and researchers agree on a timeline that establishes when the researcher can publicly explain their findings.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Sometimes, for a variety of reasons, that communication breaks down and researchers publicly disclose details of the bug. In some cases, in part to prove the existence or severity of a flaw, researchers go a step further and publish \u201cproof-of concept\u201d code capable of abusing that bug.<\/p>\n<p class=\"wp-block-paragraph\">When that happens, cybercriminals, government hackers, and others can then take the code and use it for their attacks, which prompts cybersecurity defenders to rush to deal with the fallout.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cWith these being so easily available now, and already weaponized for easy use, for better or for worse I think that ultimately puts us in another tug-of-war match between defenders and cybercriminals,\u201d John Hammond, one of the researchers at Huntress who has been tracking the case, told TechCrunch.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cScenarios like these cause us to race with our adversaries; defenders frantically try to protect against ill-intended actors who rapidly take advantage of these exploits\u2026 especially now as it is just ready-made attacker tooling,\u201d said Hammond.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/techcrunch.com\/2026\/04\/17\/hackers-are-abusing-unpatched-windows-security-flaws-to-hack-into-organizations\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers have broken into at least one organization using Windows vulnerabilities published online by a disgruntled security researcher over the last two weeks, according to a cybersecurity firm. On Friday, cybersecurity company Huntress said in a series of posts on X that its researchers have seen hackers taking advantage of three Windows security flaws, dubbed [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":235119,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":{"0":"post-235118","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"_links":{"self":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/235118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=235118"}],"version-history":[{"count":0,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/235118\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/235119"}],"wp:attachment":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=235118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=235118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=235118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}