(huntress.com) In-the-Wild Exploitation of Nightmare-Eclipse Privilege Escalation Tooling and BeigeBurrow Tunneling Agent Observed in Active Intrusion
In-the-wild exploitation of Nightmare-Eclipse tooling (BlueHammer, RedSun, UnDefend) and BeigeBurrow tunneling agent observed in active intrusion. BlueHammer (CVE-2026-33825) exploits a TOCTOU race in Windows Defender for SYSTEM-level SAM credential theft; RedSun/UnDefend remain unpatched. Initial access via compromised FortiGate SSL VPN credentials, hands-on-keyboard recon, and Go-based yamux reverse tunnel (BeigeBurrow) for persistent C2.
In brief - Threat actor leveraged novel privilege escalation tools (BlueHammer CVE-2026-33825, RedSun, UnDefend) and BeigeBurrow reverse tunnel in a failed intrusion. Initial access via FortiGate SSL VPN, post-exploitation via M365Copilot.exe. Huntress terminated activity; hunt for IOCs.
Technically - BlueHammer abuses TOCTOU in Windows Defender with Volume Shadow Copy and process suspension for SAM database read. RedSun uses oplocks/directory junctions for arbitrary write via Storage Tiers Management Engine COM. UnDefend disrupts Defender via file locks. BeigeBurrow (Go/yamux) establishes multiplexed reverse tunnel to staybud.dpdns[.]org:443. Binaries staged in user-writable paths; recon commands spawned from M365Copilot.exe.
Source: https://www.huntress.com/blog/nightmare-eclipse-intrusion

Huntress observed in-the-wild use of Nightmare-Eclipse tooling, including BlueHammer, RedSun, and UnDefend, in a live intrusion involving FortiGate VPN compromise as the initial access, reconnaissance commands, and likely tunneling activity.
@da_667 relatively weak but something is better than nothing. Might benefit from a GitHub PR if you find something interesting in network/host artifacts.
(zscaler.com) Payouts King Ransomware: Technical Analysis of a BlackBasta Successor Group
New ransomware group Payouts King, linked to former BlackBasta affiliates, emerged in April 2025 with advanced TTPs and evasion techniques.
In brief - Payouts King, a BlackBasta successor, uses spam bombing, Microsoft Teams abuse, and Quick Assist for initial access. The group employs robust encryption, anti-EDR measures, and operates a Tor-based data leak site. Zscaler ThreatLabz provides IOCs and TTPs for detection.
Technically - Payouts King ransomware uses stack-based string obfuscation, FNV1/CRC32 hashing for API resolution, and command-line argument obfuscation. File encryption leverages RSA-4096 and AES-256-CTR via OpenSSL, with per-file keys and partial encryption for performance. EDR/AV evasion includes direct Zw* system calls (e.g., ZwTerminateProcess) resolved via ntdll export table walking. Persistence is via scheduled tasks, and forensic artifacts are removed by deleting shadow copies and clearing logs.
Source: https://www.zscaler.com/blogs/security-research/payouts-king-takes-aim-ransomware-throne
A large-scale study of the Russian web hosting space has found more than 1,200 malicious command and control servers hosted inside Russia this year.
Most of the servers are for IoT malware botnets, such as Keitaro, Hajime, Mozi, and Mirai.
https://hunt.io/blog/russian-malicious-infrastructure-c2-servers-mapped