Published Windows Defender exploits are now being used in attacks

A set of Windows security flaws published online by a researcher earlier this month has already been used in at least one real-world intrusion, according to cybersecurity firm Huntress. The development turns what had been a public vulnerability disclosure into a live operational risk for organizations that rely on Microsoft Defender and have not yet applied available fixes or compensating controls.

Huntress said attackers are exploiting three vulnerabilities known as BlueHammer, UnDefend, and RedSun. Of those, only BlueHammer has been patched so far by Microsoft, with the company rolling out a fix earlier this week. The remaining issues, as described in the supplied source text, still leave uncertainty around how broadly exposed some organizations may be if they depend on default or unmodified Defender protections.

The incident also underscores an old tension in computer security: public disclosure can pressure vendors to respond faster, but detailed exploit code released before patches are broadly deployed can immediately lower the barrier for malicious actors. In this case, TechCrunch reported that the exploit activity appears to be using code published by a researcher operating under the name Chaotic Eclipse.

How the flaws entered the public domain

According to the source text, Chaotic Eclipse first posted code they said exploited an unpatched Windows vulnerability, while signaling frustration with Microsoft’s handling of the issue. Days later, the researcher published additional exploit material for UnDefend and RedSun, including code hosted on GitHub. All three vulnerabilities affect Microsoft Defender and can allow an attacker to gain elevated, administrator-level access on a targeted Windows system.

That sequence matters because exploit publication changes the threat environment quickly. Once working code is public, attackers no longer need to independently discover the bug or build their own tooling from scratch. They can adapt published material, automate it, and test it against exposed systems at speed.

The source text does not identify the victim organization, nor does it name the threat actor responsible. But the lack of attribution does not reduce the significance of the case. In practical terms, defenders now have confirmed evidence that opportunistic or targeted attackers are acting on these disclosures.