SPEAK WITH AN EXPERT
Two individuals sit in front of multiple computer screens, analyzing data and discussing information related to Managed Detection and Response in a dimly lit room with a cityscape visible through the window.

Threat Alerts

Your place for the latest CyberProof cyber threat intelligence alerts and updates

Speak with an Expert
All

BlueHammer Zero-Day Exploits Windows Defender for Privilege Escalation

13-Apr-2026
Label: Vulnerability
Threat Level: Medium

A zero-day privilege escalation vulnerability in Windows Defender allows attackers to gain SYSTEM-level access on Windows 10 and 11 systems. The exploit, publicly released with full source code, chains legitimate Windows components to bypass security controls without requiring memory corruption or kernel exploits.

The attack exploits Windows Defender’s signature update process by registering as a Cloud Files sync provider and placing opportunistic locks on update files during the antivirus definition update sequence. When Defender attempts to process updates, the exploit redirects privileged file operations through symbolic links to access Volume Shadow Copy snapshots containing the SAM database. The malicious code extracts NTLM password hashes, temporarily modifies local administrator credentials, and escalates privileges to SYSTEM level through Windows service creation.

The vulnerability requires a pending Defender signature update to trigger the attack chain, making it timing-dependent but still dangerous. Multiple security researchers have confirmed the exploit works on fully patched Windows systems, with the technique remaining undetected since it uses normal Windows components performing their intended functions. Microsoft has only released signature-based detection for the specific compiled binary, leaving the underlying vulnerability unpatched and exploitable through code modifications.

Supply Chain Malware Campaign Targets Trusted System Monitoring Tools

13-Apr-2026
Label: Malware
Threat Level: Medium

A recent supply chain attack targeted widely used system monitoring utilities, exposing a broad and highly privileged user base to malware distribution through trusted software channels. By compromising an official download source, the attackers were able to deliver a trojanized version of a legitimate application, resulting in the silent execution of malicious code on systems that often belong to technical professionals, administrators, and enterprise environments. The impact of this activity is significant, as it directly affected tools commonly used for diagnostics and system analysis, creating an opportunity for large-scale credential theft and long-term system access.

The attack began when users were redirected from a legitimate download page to an attacker-controlled hosting location that served a modified installer. While the core application files appeared authentic, an additional malicious dynamic-link library was included and loaded automatically when the 64-bit version of the application was launched, abusing standard DLL search order behavior. This initiated a multi-stage infection chain that relied entirely on in-memory execution. The loader decrypted and reflectively loaded several successive payloads using XOR-based routines and bitwise transformations, avoiding the creation of observable artifacts on disk as it progressed through each stage.

The final stage deployed a remote access trojan that established communication with a hardcoded command-and-control server, transmitting system and environment metadata to allow victim tracking across multiple campaigns. The malware provided the attacker with credential access across browsers, VPN clients, and other commonly used tools, along with persistent remote control capabilities. By focusing on a trusted utility with a portable execution model frequently used in restricted environments, the operation achieved rapid reach within a short exposure window, culminating in a compromise chain designed for broad visibility, credential harvesting, and ongoing access rather than immediate disruption.

UNC1069 Expands Malware Campaign via Fake Video Calls and Modular Implants

13-Apr-2026
Label: Malware
Threat Level: Medium

A sophisticated malware campaign attributed to DPRK-linked threat actor UNC1069 is leveraging fake Microsoft Teams and Zoom meetings to deliver multi-stage implants through highly targeted social engineering. Active since early 2026, the operation relies on compromised accounts and impersonation to build trust over extended periods before delivering malicious meeting links. Victims are directed to browser-based meeting interfaces that convincingly replicate legitimate platforms, where attackers guide them in real time to execute a minimal initial payload, typically an AppleScript or command-line instruction, enabling the download of a second-stage implant.

Once executed, the malware establishes persistence, assigns a unique identifier to the host, and begins periodic communication with command-and-control infrastructure. The implant operates as a modular framework, allowing operators to deploy tailored capabilities post-compromise, including credential theft, keylogging, session hijacking, and extraction of sensitive assets such as crypto wallets, SSH keys, and cloud credentials. The malware targets multiple platforms, with a strong focus on macOS environments, and is designed to remain stealthy by delaying malicious actions and minimizing initial indicators.

This campaign highlights a growing trend in advanced threat activity combining deep social engineering with flexible malware delivery. By exploiting trusted relationships and using interactive deception during fake meetings, UNC1069 significantly increases infection success rates while maintaining operational stealth.

Adobe Acrobat Reader Zero-Day CVE-2026-34621 Actively Exploited

13-Apr-2026
Label: Vulnerability
Threat Level: Medium

Adobe has released emergency patches for a critical zero-day vulnerability in Acrobat Reader that attackers have been actively exploiting. CVE-2026-34621 (CVSS Score 9.6) enables arbitrary code execution through malicious PDF files, requiring only that victims open the document.

The vulnerability stems from a prototype pollution flaw in Adobe Reader’s JavaScript engine, allowing attackers to manipulate application objects and properties. Exploitation occurs when specially crafted PDF documents are opened, with no additional user interaction required beyond the initial file access. Security researchers identified the attack as highly sophisticated, utilizing fingerprinting techniques and targeting privileged application programming interfaces.

Critical Remote Code Execution Flaw Found in Apache ActiveMQ Classic

13-Apr-2026
Label: Vulnerability
Threat Level: Medium

A critical remote code execution vulnerability has been discovered in Apache ActiveMQ Classic. Tracked as CVE-2026-34197 (CVSS Score 8.8), the flaw affects all versions prior to 5.19.4 and all 6.x versions up to 6.2.3 β€” a broad version range that explains why it slipped under the radar for so long. Given how widely the Classic edition is deployed across enterprise, government, and Java-based backend systems, the potential impact is significant.
What makes this vulnerability particularly notable is that it didn’t stem from a single flawed component, but rather from the dangerous interaction between several independently functioning features. Each feature behaved as expected in isolation, but together they created an exploitable path that had long gone unnoticed β€” a subtle combination that AI-assisted analysis was well-suited to detect.
Technically, the flaw involves a management API that exposes a broker function capable of loading external configurations. By sending a crafted request, an attacker can force the broker to fetch a remote configuration file and execute arbitrary system commands during initialization. While the attack path normally requires authentication, a separate previously disclosed bug β€” CVE-2024-32114 β€” removes that requirement entirely on certain versions, making exploitation even more accessible.

Chrome Fixes Critical WebML Vulnerabilities and Other Issues

13-Apr-2026
Label: Vulnerability
Threat Level: Medium

Google has released the first stable version of Chrome , addressing multiple security issues, including two critical vulnerabilities that impact the browser’s WebML component, which is responsible for executing machine learning models directly within the browser environment. The flaws, tracked as CVE-2026-5858 and CVE-2026-5859, pose significant security risks due to their potential to enable remote code execution and sandbox escape scenarios. By targeting WebML, these vulnerabilities highlight the expanding attack surface introduced by integrating advanced machine learning capabilities into modern web browsers.

The first vulnerability CVE-2026-5858 is a heap buffer overflow that could allow attackers to corrupt memory and potentially execute arbitrary code by convincing users to interact with specially crafted web content. The second CVE-2026-5859, is an integer overflow that may lead to improper memory allocation and subsequent exploitation, similarly enabling arbitrary code execution or escalation beyond the browser’s sandbox protections. Both vulnerabilities were addressed in the Chrome 147 update and no evidence of active exploitation has been reported. In addition to these fixes, Google implemented enhanced session cookie protections to mitigate risks associated with stolen authentication tokens, reinforcing overall browser security. Users and organizations are strongly advised to update to the latest version of Chrome to ensure protection against these critical threats.

NEWS AND RESOURCES

What’s on at CyberProof

Speak with a cybersecurity expert

Speak with an expert

Explore how CyberProof can help you anticipate, prevent, and mitigate ever-evolving cyberattacks in hybrid and cloud-native environments.

SPEAK WITH AN EXPERT