Two unpatched Windows local privilege escalation zero-days — BlueHammer and RedSun — are being actively weaponized as of April 17, 2026. Both were released publicly by a disgruntled researcher as a protest against Microsoft's MSRC vulnerability disclosure process. Independent researcher Will Dormann verified that RedSun works on fully-patched Windows 10, 11, and Server 2019+. Microsoft has no patches. Threat actors already do.

This week's Windows zero-day crisis does not arrive in isolation. CISA added six vulnerabilities to its Known Exploited Vulnerabilities catalog over the past 72 hours — including CVE-2012-1854, a Microsoft VBA flaw first disclosed in 2012 that is now confirmed to be actively exploited 14 years after its original patch. More urgently, CVE-2023-21529, a deserialization RCE in Microsoft Exchange Server, is being actively leveraged by Storm-1175 to deploy Medusa ransomware in enterprise environments right now.

Parallel to these CVE-centred threats, Payouts King — a new ransomware group attributed to former BlackBasta affiliates — has introduced a QEMU virtualisation-based evasion technique that makes its malicious activity invisible to Windows Defender and conventional EDR tools. Cisco published emergency patches for four critical flaws, three rated CVSS 9.9 in its Identity Services Engine and one CVSS 9.8 in Webex Services. And Darktrace disclosed ZionSiphon, an OT malware sample with hardcoded functions to manipulate chlorine levels in Israeli water and desalination infrastructure.

This roundup covers all five threat clusters with detection guidance and a prioritised remediation checklist. Multiple zero-day-class items demand concurrent response this week.

BlueHammer and RedSun: Two Unpatched Windows LPEs Actively Exploited Right Now

On April 3, a researcher operating under the aliases 'Nightmare-Eclipse' and 'Chaotic Eclipse' publicly leaked BlueHammer — a Windows local privilege escalation exploit — in protest against Microsoft's MSRC vulnerability disclosure handling. On April 16, the same researcher released RedSun, a second LPE targeting Windows Defender internals. Within 24 hours of RedSun's release, BleepingComputer confirmed threat actors are actively weaponizing both exploits in the wild.

BlueHammer exploits a TOCTOU (time-of-check to time-of-use) race condition combined with a path confusion vulnerability to achieve SYSTEM-level privilege on Windows. Once elevated, attackers gain read access to the SAM (Security Account Manager) database, enabling extraction of local password hashes and facilitating lateral movement without additional tooling. No CVE has been assigned to BlueHammer as of April 17, 2026.

RedSun is the more technically sophisticated of the two. It abuses a subtle behaviour in Windows Defender's cloud-tagging file rewrite mechanism. The attack chain exploits the Cloud Files API to set up a volume shadow copy race via an oplock, then uses a directory junction and reparse point manipulation to redirect Defender's own file rewrites to system-critical executables. The result is arbitrary code execution as SYSTEM — confirmed working on fully-patched Windows 10, 11, and Server 2019+ by independent researcher Will Dormann.

No Microsoft patches exist for either vulnerability. Recommended compensating controls: restrict physical and RDP access to Windows endpoints, deploy detections for anomalous VSS operations combined with junction creation, alert on unexpected SYSTEM-level process spawning from non-standard parents, and monitor for SAM database access outside the LSASS process.

CISA Adds 6 to KEV This Week — Including a 14-Year-Old Microsoft VBA Flaw

Between April 13 and April 16, CISA added six vulnerabilities to its Known Exploited Vulnerabilities catalog, with the majority carrying an April 27 federal remediation deadline. The entries span Fortinet, Adobe, Windows, and Microsoft Exchange — and include one of the oldest vulnerabilities ever confirmed exploited in the KEV's current era.

CVE-2012-1854 — a Microsoft VBA insecure library loading flaw first disclosed in 2012 — is now confirmed to be actively exploited 14 years after its original patch was released. Organisations running unpatched legacy Office configurations or terminal server environments with older VBA-enabled documents remain exposed.

The most operationally critical entry is CVE-2023-21529 (CVSS 8.8): a deserialization RCE in Microsoft Exchange Server patched in February 2023 that is now being actively leveraged by the financially motivated threat actor Storm-1175 to deploy Medusa ransomware against enterprise environments. Organisations that have not applied the February 2023 Exchange cumulative updates face active ransomware exposure today.

Also added: CVE-2026-34621 (Adobe Acrobat Reader prototype pollution leading to RCE, CVSS 8.6, exploited since at least December 2025 per researcher Haifei Li), CVE-2025-60710 (Windows Task Host LPE via improper link resolution, CVSS 7.8), and CVE-2023-36424 (Windows CLFS Driver out-of-bounds read leading to LPE, CVSS 7.8). Cross-reference these against your [April Patch Tuesday 2026](/blog/patch-tuesday-april-2026) deployment records to confirm none have been missed before the April 27 federal deadline.

Payouts King Ransomware: QEMU Virtual Machines Make EDR Tools Completely Blind

Payouts King — tracked as STAC4713 by Zscaler ThreatLabz and attributed with high confidence to former BlackBasta affiliates — is the most technically innovative new ransomware group documented in April 2026. Its core evasion technique operates at the hypervisor layer, bypassing host-based endpoint security entirely.

After gaining initial access, Payouts King deploys QEMU, the open-source virtualiser, to spin up a hidden Alpine Linux 3.22.0 VM on compromised Windows hosts. All C2 communication, lateral movement staging, and credential harvesting runs inside the guest VM. Because Windows Defender and most endpoint security tools cannot inspect guest VM memory or network traffic at the hypervisor level, all malicious activity is invisible to host-based security telemetry.

QEMU disk images are disguised as legitimate files: `vault.db` (mimicking a database file) or `birsv.dll` (mimicking a system DLL). Persistence is achieved via a scheduled task named `TPMProfiler` — deliberately designed to blend with legitimate Trusted Platform Module management tasks — launched as SYSTEM on startup.

Initial access exploits CVE-2025-26399 (SolarWinds Web Help Desk) and CVE-2025-5777 (CitrixBleed 2, affecting Citrix NetScaler ADC/Gateway). Additional vectors include phishing via Microsoft Teams and abuse of Windows QuickAssist. Encryption uses AES-256 in CTR mode with RSA-4096 key exchange; large files receive intermittent encryption for speed. Data exfiltration is performed via Rclone to attacker-controlled SFTP infrastructure.

This technique is distinct from BYOVD (Bring Your Own Vulnerable Driver) approaches used by groups like [Qilin to silence EDR tools](/blog/qilin-byovd-edr-silencing) — instead operating at the hypervisor layer, making it significantly harder to detect with host-based telemetry alone.

The use of QEMU as a virtualisation layer represents a fundamental shift in how ransomware groups approach endpoint detection evasion — by moving their malicious infrastructure entirely outside the host OS's visibility model.

Zscaler ThreatLabz, STAC4713 Analysis, April 2026
Indicators of Compromise
ArtifactTypeSHA-256 (Truncated)
vault.dbFileQEMU disk image disguised as database file
birsv.dllFileQEMU disk image disguised as system DLL
TPMProfilerScheduled TaskPersistence — launches QEMU VM as SYSTEM on startup
CVE-2025-26399CVEInitial access — SolarWinds Web Help Desk
CVE-2025-5777CVEInitial access — CitrixBleed 2 (NetScaler ADC/Gateway)
Alpine Linux 3.22.0 guest imageVM ImageDeployed via QEMU on compromised Windows host for C2 and lateral movement

Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.

Cisco Emergency Patches: Three ISE Flaws at CVSS 9.9 and a Webex SSO Impersonation Bug

On April 15–16, 2026, Cisco published critical patches for four vulnerabilities across two of its most widely deployed enterprise platforms. Both require manual administrator action — neither product auto-remediates.

CVE-2026-20184 (CVSS 9.8) in Cisco Webex Services involves improper certificate validation in the SSO/Control Hub SAML integration. An unauthenticated attacker who can intercept or manipulate SAML assertions can impersonate any Webex user, gaining full access to meetings, recorded content, shared files, and private channels. With 400 million+ registered Webex users, the potential exposure is significant. Cisco provides no automated patch — administrators must manually upload a new SAML certificate for their identity provider to Webex Control Hub. No workaround is available.

The three Cisco Identity Services Engine flaws — CVE-2026-20147, CVE-2026-20180, and CVE-2026-20186, all carrying CVSS 9.9 — exploit insufficient input validation to enable OS command execution and root privilege escalation. ISE is the network access control (NAC) backbone for enterprise environments, controlling which devices and users access the corporate network. A compromised ISE instance gives attackers the ability to authorise rogue endpoints, revoke legitimate access, and pivot undetected through network segments that would otherwise be isolated.

None of these vulnerabilities are currently reported as exploited in the wild, but given their CVSS scores and the critical operational role of both products, security teams should treat these as emergency change-window items.

CVE-2026-20184 — Cisco Webex Services (CVSS 9.8)

Upload a new SAML IdP certificate to Webex Control Hub. No workaround exists — manual action required by every Webex administrator.

CVE-2026-20147/20180/20186 — Cisco ISE (CVSS 9.9)

Apply available ISE/ISE-PIC patches immediately. Regenerate affected certificates and validate network access control policies after patching.

Post-patch ISE audit

After remediating ISE, audit all authorised device grants made during the vulnerability window. Treat any unexplained endpoint authorisations as suspect.

ZionSiphon OT Malware Engineered to Poison Israeli Water and Desalination Supplies

On April 16, Darktrace published detailed analysis of ZionSiphon, a novel OT malware sample targeting Israeli water and desalination infrastructure. Among publicly disclosed ICS/OT threats in 2026, it is among the most specifically targeted samples analysed.

ZionSiphon contains hardcoded names of six Israeli water infrastructure organisations: Mekorot (Israel's national water company), desalination facilities at Sorek, Hadera, Ashdod, and Palmachim, and the Shafdan wastewater treatment plant. It scans for OT process names — `DesalPLC`, `ROController`, `ChlorineCtrl` — and probes three OT communication protocols: Modbus on port 502, DNP3 on port 20000, and S7comm on port 102.

The malware contains a function named `IncreaseChlorineLevel()` that appends sabotage parameters directly to OT configuration files: `Chlorine_Dose=10`, `Chlorine_Pump=ON`, `Chlorine_Flow=MAX`, `RO_Pressure=80`. If executed on a live treatment plant, these values exceed safe operational thresholds and could produce hazardous chlorine concentrations in treated water.

The infection chain uses PowerShell-based privilege escalation (MITRE T1547.001), registry persistence under `HKCU\...\Run` as 'SystemHealthCheck', and USB propagation (MITRE T1091) for potential air-gapped network crossing. Attribution is assessed as Iranian-aligned based on Base64-encoded political messaging embedded in the binary.

Darktrace identified an XOR bug in the country validation routine — suggesting this may be a development build not yet fully operational. The disclosed capabilities nonetheless represent documented intent to sabotage civilian water infrastructure.

1

PowerShell Privilege Escalation

Executes PowerShell payload to elevate privileges on a Windows host connected to the OT network.

2

Registry Persistence

Creates 'SystemHealthCheck' entry in HKCU\Software\Microsoft\Windows\CurrentVersion\Run for startup persistence.

3

OT Protocol Scanning

Scans subnets for Modbus (502), DNP3 (20000), and S7comm (102) services; identifies target PLC process names.

4

Configuration File Tampering

Appends Chlorine_Dose=10, Chlorine_Pump=ON, Chlorine_Flow=MAX, RO_Pressure=80 to OT configuration files to sabotage treatment parameters.

5

USB Propagation

Copies payload to removable media for potential spread across air-gapped OT network segments.

This Week's Prioritised Remediation Checklist for Security Teams

This week requires concurrent action across three categories: compensating controls for unpatched zero-days, emergency vendor patch deployment, and detection engineering for novel evasion techniques.

For BlueHammer and RedSun, no patches exist — the priority is access restriction and detection logic. Both exploits require a local foothold on a Windows system. Enforce least-privilege policies, restrict who can obtain local or RDP sessions, and deploy monitoring for anomalous VSS operations, directory junction creation, and SAM database access outside LSASS.

For Exchange Server CVE-2023-21529 (Storm-1175/Medusa ransomware): if February 2023 Exchange cumulative updates have not been verified, treat this as an emergency patch item. Confirm patch status and sweep Exchange event logs for indicators of exploitation.

For Cisco Webex and ISE: both require manual intervention in change windows. Schedule SAML certificate rotation for Webex and patch-plus-cert-regeneration for ISE. Post-remediation, audit ISE authorisation logs for anomalous device grants made during the exposure window.

For the April 27 CISA KEV deadlines: validate Adobe Acrobat/Reader is updated to v26.001.21411 or later, confirm Microsoft VBA CVE-2012-1854 is patched across all Office installations, and verify CLFS driver and Windows Task Host patches from recent Patch Tuesday cycles are fully deployed.

For Payouts King and QEMU detection: inventory QEMU installations across enterprise endpoints — legitimate use cases are rare outside developer and virtualisation team machines. Alert on scheduled tasks named 'TPMProfiler' not tied to verified TPM management tooling, and flag execution of VM disk images from non-standard paths.

BlueHammer / RedSun (no patch available)

Restrict local and RDP access; deploy VSS + junction-creation alerts in SIEM; monitor for SAM access outside LSASS; enforce least privilege across all Windows endpoints.

CVE-2023-21529 — Microsoft Exchange (CVSS 8.8, actively exploited)

Apply February 2023 Exchange cumulative updates immediately. Storm-1175 is actively deploying Medusa ransomware through this vector today.

CVE-2026-20184 — Cisco Webex (CVSS 9.8)

Manually upload a new SAML IdP certificate to Webex Control Hub. No automatic fix or workaround available.

CVE-2026-20147/20180/20186 — Cisco ISE (CVSS 9.9)

Apply ISE patches in an emergency change window. Regenerate certificates and audit all device authorisation grants post-patch.

CVE-2026-34621 — Adobe Acrobat Reader (CVSS 8.6, deadline Apr 27)

Update Acrobat DC/Reader DC to v26.001.21411 or Acrobat 2024 (Win) to v24.001.30362 before the April 27 federal deadline.

CVE-2012-1854 — Microsoft VBA (CVSS 7.8, deadline Apr 27)

Validate the 2012 VBA patch is applied across all Office installations and restrict VBA macro execution policies to signed macros only.

Payouts King / QEMU detection

Inventory QEMU on enterprise endpoints; alert on TPMProfiler scheduled tasks; flag vault.db and birsv.dll file execution outside expected application directories.

ZionSiphon (OT/ICS environments)

Sweep for 'SystemHealthCheck' registry run entries; audit USB policies; restrict Modbus, DNP3, and S7comm access to authorised OT management hosts only.

The bottom line

Windows zero-day BlueHammer and RedSun are being actively exploited right now with no Microsoft patch on the horizon — layer that with Storm-1175 weaponising a three-year-old Exchange deserialization flaw for Medusa ransomware, a 14-year-old VBA flaw now confirmed exploited, Payouts King making EDR blind with QEMU hypervisors, and Cisco pushing CVSS 9.9 emergency patches, and this week's threat volume is unusually high. Pick one priority and act now: patch CVE-2023-21529 on Exchange, rotate Cisco Webex SAML certificates, and deploy BlueHammer/RedSun detection logic before end of business today.

Frequently asked questions

What are BlueHammer and RedSun vulnerabilities?

BlueHammer and RedSun are two unpatched local privilege escalation (LPE) zero-days in Windows, released publicly by a researcher using the alias 'Nightmare-Eclipse' in April 2026 as a protest against Microsoft's MSRC disclosure handling. BlueHammer exploits a TOCTOU path confusion flaw to gain SYSTEM access and reach the SAM password database. RedSun abuses Windows Defender's cloud-tagging file rewrite behaviour via a volume shadow copy race and directory junction, achieving SYSTEM execution on fully-patched Windows 10, 11, and Server 2019+.

Is there a patch for BlueHammer or RedSun?

No. As of April 17, 2026, Microsoft has released no patches for BlueHammer or RedSun. Both exploits work on fully-patched Windows 10, 11, and Server 2019+ and are now being actively weaponized in the wild. Compensating controls include restricting local and remote access, monitoring VSS operations and anomalous SYSTEM-level process spawning, hunting for SAM database access outside LSASS, and implementing least-privilege policies to deny attackers the local foothold both exploits require.

How does Payouts King ransomware evade EDR detection?

Payouts King deploys QEMU, the open-source virtualiser, to run a hidden Alpine Linux VM on compromised Windows hosts. All C2 activity runs inside the VM, invisible to Windows Defender and conventional EDR tools. Disk images are disguised as 'vault.db' or 'birsv.dll'. A scheduled task named 'TPMProfiler' launches the VM as SYSTEM on startup. Encryption uses AES-256 CTR with RSA-4096. Initial access exploits CVE-2025-26399 (SolarWinds Web Help Desk) and CVE-2025-5777 (CitrixBleed 2, Citrix NetScaler ADC/Gateway).

What CVEs did CISA add to KEV this week?

CISA added six vulnerabilities this week: CVE-2026-21643 (Fortinet FortiClient EMS, CVSS 9.1), CVE-2026-34621 (Adobe Acrobat Reader, CVSS 8.6), CVE-2025-60710 (Windows Task Host LPE, CVSS 7.8), CVE-2023-36424 (Windows CLFS Driver LPE, CVSS 7.8), CVE-2023-21529 (Microsoft Exchange Server deserialization RCE, CVSS 8.8 — now used by Storm-1175 for Medusa ransomware), and CVE-2012-1854 (Microsoft VBA, CVSS 7.8 — a 14-year-old flaw now confirmed exploited). Federal deadline for most: April 27, 2026.

Which Cisco products need emergency patching right now?

Cisco Webex Services (CVE-2026-20184, CVSS 9.8) and Cisco Identity Services Engine (CVE-2026-20147, CVE-2026-20180, CVE-2026-20186 — all CVSS 9.9). The Webex flaw enables unauthenticated user impersonation via an SSO certificate validation bypass affecting 400M+ users. The three ISE flaws allow OS command execution and root escalation. Neither product auto-patches: Webex admins must manually upload a new SAML IdP certificate to Control Hub; ISE admins must apply patches and regenerate certificates.

What is ZionSiphon malware?

ZionSiphon is an OT malware sample analysed by Darktrace, designed to sabotage Israeli water and desalination infrastructure. It hardcodes targets including Mekorot (Israel's national water company), desalination plants at Sorek, Hadera, Ashdod, and Palmachim, and the Shafdan wastewater facility. A function called IncreaseChlorineLevel() appends dangerous parameters to OT config files. The sample contains embedded pro-Iran political messaging and an XOR bug suggesting it may be a developmental build not yet fully weaponized.

How do I detect BlueHammer or RedSun exploitation on my network?

For RedSun: monitor for VSS shadow copy operations combined with directory junction creation (MITRE T1187), and alert on Windows Defender file rewrite activity that spawns unexpected SYSTEM processes. For BlueHammer: detect SAM database access from processes other than LSASS and flag path confusion anomalies in high-privilege contexts. For both: baseline all legitimate TPMProfiler scheduled tasks and flag any instances not associated with TPM device management. Deploy LPE detection rules in SIEM across both exploit classes.

What should security teams prioritise patching this week?

Priority order: (1) Deploy Cisco patches for CVE-2026-20184 and the three ISE CVSS 9.9 flaws — manual cert operations required; (2) Patch CVE-2023-21529 (Exchange) immediately — Storm-1175 is actively deploying Medusa ransomware via it; (3) Patch Adobe Acrobat CVE-2026-34621 and Microsoft VBA CVE-2012-1854 before the April 27 CISA federal deadline; (4) Implement compensating controls for BlueHammer and RedSun while awaiting Microsoft patches; (5) Audit QEMU installations on enterprise endpoints — legitimate use cases are rare.

Sources & references

  1. BleepingComputer — Recently Leaked Windows Zero-Days Now Exploited
  2. BleepingComputer — Disgruntled researcher leaks BlueHammer Windows zero-day exploit
  3. BleepingComputer — New Microsoft Defender RedSun zero-day PoC grants SYSTEM privileges
  4. The Hacker News — CISA Adds 6 Known Exploited Flaws
  5. CISA KEV Catalog — April 2026 Additions
  6. The Register — Storm-1175 Exploits Exchange CVE-2023-21529 for Medusa Ransomware
  7. BleepingComputer — Payouts King Ransomware Uses QEMU VMs to Bypass Endpoint Security
  8. GBHackers — Payouts King Emerges
  9. SecurityBoulevard — Payouts King Takes Aim at the Ransomware Throne
  10. The Hacker News — Cisco Patches Four Critical Identity and Collaboration Vulnerabilities
  11. Darktrace — Inside ZionSiphon: Analysis of OT Malware Targeting Israeli Water Systems
  12. CYFIRMA Weekly Intelligence Report — April 17, 2026
  13. Integrity360 Cyber News Roundup — April 17, 2026
  14. SecurityAffairs — CISA adds Apache ActiveMQ CVE-2026-34197 to KEV catalog
Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.