Intelligence Insights: April 2026 banner image
Blog

Intelligence Insights: April 2026

By Bridewell CSIRT 6 May 2026 5 min read

Daniel Whitcombe, Threat Intelligence Analyst | Alex Jones, Junior Threat Intelligence Analyst | Nathan Richards, Threat Intelligence Analyst | Aneta Avramova, Academy CTI Analyst

The Bridewell Threat-Led Approach

Bridewell’s managed security services are built upon a proactive, threat-led defence strategy. Moving beyond reactive monitoring, we actively track adversary infrastructure and tradecraft. By seamlessly integrating Cyber Threat Intelligence (CTI), Incident Response (IR), and Managed Detection and Response (MDR), we ensure our clients remain ahead of the evolving threat landscape.

In a landscape defined by rapid adaptation, knowing what is attacking you is just as critical as knowing how. This month’s Threat Insights leverages data from Bridewell’s global MDR and Incident Response engagements to expose the top malicious infrastructure of April 2026. We go beyond the headlines to provide actionable detection guidance on the month's threat insights, equipping your team with the foresight to stay one step ahead.

Top 5 Malicious Infrastructure Threats Tracked

NameCategoryApril VolumeMonthly Trend
Cerberus-AndroidRemote Access Trojan (RAT)2056▲ Rising
BurpVulnerability Scanner309▲ Rising
Cobalt StrikeExploitation Framework221▲ Rising
SliverExploitation Framework136▼ Decreasing
MetasploitExploitation Framework78▲ Rising

Threat Detection Insights - April

BlueHammer Vulnerability

Throughout April, our team closely monitored emerging Windows privilege escalation threats, with particular focus on newly disclosed Microsoft Defender related weaknesses that lower the barrier to SYSTEM-level compromise. This month’s insights examine BlueHammer, a publicly released proof-of-concept exploit demonstrating how legitimate Windows and Defender mechanisms can be abused to escalate privileges from a standard user context.

In early April 2026, a researcher operating under the alias ‘Chaotic Eclipse’ / ‘Nightmare-Eclipse’ released exploit code for the unpatched Windows zero-day ‘BlueHammer’. The vulnerability abuses the Microsoft Defender Antivirus update mechanism, chaining Volume Shadow Copy Service (VSS), Cloud Files API, opportunistic locking, and path confusion to achieve SYSTEM-level access.

At the time of writing, no CVE has been assigned, and no official patch or mitigation has been released. The exploit is publicly available and has been independently validated, increasing the likelihood of real-world weaponisation. While local access is required, successful exploitation enables credential extraction from the SAM database and full administrative compromise.

Community Detection Opportunities

MDE_DeviceFileEvents_BlueHammerPOC_SuspiciousVolumeShadowCopyAccess
DeviceFileEvents
| where FolderPath matches regex @"HarddiskVolumeShadowCopy\d+"
| where not(InitiatingProcessAccountName =~ "system")
| where not(FileName has_any ("AM_Delta"))
| where not(InitiatingProcessFileName has_any ("lsass.exe", "vssvc.exe", "SearchIndexer.exe", "msmpeng.exe", "vmms.exe"))
| project TimeGenerated, DeviceName, InitiatingProcessAccountName, InitiatingProcessFileName, FolderPath, FileName, InitiatingProcessCommandLine
            

RedSun Vulnerability

RedSun is a proof-of-concept privilege escalation vulnerability affecting Microsoft Defender, allowing SYSTEM-level access on fully patched Windows systems. The exploit abuses Defender’s handling of malicious cloud-tagged files, enabling file overwrite operations within critical system directories such as C:\Windows\System32.

The vulnerability has been demonstrated across Windows 10, Windows 11, and Windows Server environments. It requires no administrator privileges, UAC bypass, or kernel exploit, significantly lowering the barrier to exploitation following initial compromise.

Community Detection Opportunities

MDE_DeviceEvents_RedSunDefenderExploit_NamedPipeEvent
DeviceEvents
| where ActionType == "NamedPipeEvent"
| extend sus_NamedPipe = tostring(parse_json(AdditionalFields).PipeName)
| where (sus_NamedPipe has_any ("RedSun", "Tiering") or sus_NamedPipe contains "redsun")
| project TimeGenerated, DeviceName, ActionType, InitiatingProcessFileName, InitiatingProcessFolderPath, InitiatingProcessCommandLine, InitiatingProcessParentFileName, sus_NamedPipe
            

Bridewell CSIRT Detection Rules & Analytics

The following detection content was generated through our managed threat intelligence, threat hunting, and detection and response (MDR) services. The content automatically protects our customers from known and emerging threats.

Detection Analytic ConceptCategory
MDE_DeviceProcessEvents_BlueHammerPOC_ExploitationAttemptsPrivilege Escalation
MDE_DeviceProcessEvents_BlueHammerPOC_DefenderProcessShellSpawnPrivilege Escalation
MDE_DeviceImageLoadEvents_BlueHammerPOC_CldApiAbuseDefense Evasion
MDE_DeviceProcessEvents_BlueHammerPOC_DefenderProcessAnomaliesDefense Evasion
MDE_DeviceEvents_RedSunDefenderExploit_AntiMalwareActionDefense Evasion
MDE_DeviceFileEvents_RedSunDefenderExploit_TieringEngineServiceOverwriteDefense Evasion
MDE_DeviceProcessEvents_RedSunDefenderExploit_TieringEngineServiceExecutionPrivilege Escalation
MDE_DeviceProcessEvents_RedSunDefenderExploit_TieringEngineServiceExecution2Persistence

Stop Reacting. Start Hunting.

Bridewell’s threat-led MDR service combines world-class analysts with proprietary intelligence to protect your critical infrastructure and assets 24/7.

bridewell-logo

Bridewell CSIRT

Cyber Security Incident Response Team

Real-world incident response insights from our cyber security experts.