Loading...
Loading...
Security researchers have disclosed and published “BlueHammer,” a working Windows privilege-escalation exploit that abuses Microsoft Defender’s trusted update process to gain NT AUTHORITY\SYSTEM on Windows 10 and 11 (and elevated admin on Windows Server). Rather than relying on a kernel bug, the technique chains legitimate Windows components—Defender, Volume Shadow Copy Service, Cloud Files APIs, opportunistic locks, and Defender’s RPC interface—to manipulate Defender’s signature update workflow, create shadow copies, and access protected files like registry hives to reset credentials and impersonate SYSTEM. With source code available and no CVE or patch yet, defenders face heightened urgency to apply mitigations and reduce exposure.
A public exploit named BlueHammer abuses Windows Defender’s update process to escalate a low-privilege user to SYSTEM (or administrator on servers). Researcher “Chaotic Eclipse” published full exploit code on GitHub after accusing Microsoft’s Security Response Center of breaking an agreement. The chain uses five legitimate Windows features — Defender, Volume Shadow Copy Service, Cloud Files API, opportunistic locks, and Defender’s RPC interface — to freeze Defender during a signature update, mount a shadow copy, read SAM/SYSTEM/SECURITY hives, decrypt NTLM hashes, and replace an admin password to gain elevated tokens. It needs a pending Defender signature update to trigger, making it opportunistic but practical on patched Windows 10/11 installs. The disclosure raises urgent mitigation and patching concerns for Windows endpoints and defenders.
A researcher publishing as Chaotic Eclipse released BlueHammer, a public proof-of-concept and full exploit on GitHub that leverages Windows Defender’s update process to escalate a low-privileged account to NT AUTHORITY\SYSTEM on Windows 10/11 (and to elevated admin on Windows Server). The chain abuses five legitimate components—Windows Defender, Volume Shadow Copy Service, Cloud Files API, opportunistic locks, and Defender’s internal RPC—by stalling Defender during a definition update when a shadow copy is mounted, allowing extraction and decryption of SAM and registry hives to reset an admin password and obtain SYSTEM tokens. The code is unpatched and needs a pending Defender signature update to trigger, making it a serious operational risk despite being conditional. The disclosure follows a contentious interaction between the researcher and Microsoft’s security team.
Researchers disclosed “BlueHammer,” a technique that abuses Windows Defender’s update process to escalate privileges and achieve SYSTEM-level access. The exploit manipulates Defender’s update/install routine—trusted by the OS—to execute attacker-controlled code with elevated rights, bypassing normal user protections. Key players include Microsoft Windows Defender (Windows Security) and the security researchers who reported the method; details and proof-of-concept behavior appeared in a linked write-up on hackingpassion.com and were discussed on Hacker News. This matters because Defender is a privileged, built-in security component; abusing its update flow undermines endpoint security, affects enterprise and consumer Windows installs, and raises urgent patching and mitigation considerations for sysadmins and security teams.
Security researcher Chaotic Eclipse publicly released a working exploit called BlueHammer that abuses Windows Defender’s update process to escalate any low-privileged user to NT AUTHORITY\SYSTEM on Windows 10 and 11 (and to elevated admin on Windows Server). The exploit, published April 2–3 with full source on GitHub, chains five legitimate Windows components—Windows Defender, Volume Shadow Copy Service, Cloud Files API, opportunistic locks, and Defender’s RPC interface—so that a Defender signature update creates a shadow copy containing locked files like the SAM hive, the exploit triggers an oplock during Defender’s file access, then reads and decrypts registry hives to change admin passwords and impersonate SYSTEM. The researcher says Microsoft ignored prior warnings; there is no patch or CVE yet. This matters because it provides a practical, non-kernel privilege escalation using built-in services and published code, increasing attacker risk until mitigations arrive.