Hackers Use Nightmare-Eclipse Tools After Compromising FortiGate SSL VPN Access

Hackers Use Nightmare-Eclipse Tools After Compromising FortiGate SSL VPN Access

CyberSecurityNews technology

Key Points:

  • A real-world intrusion campaign exploited publicly available privilege escalation tools BlueHammer, RedSun, and UnDefend, following unauthorized access via a compromised FortiGate SSL VPN, marking their first confirmed use in a live enterprise environment.
  • These tools, developed by the pseudonymous researcher Nightmare-Eclipse, exploit Windows Defender logic flaws to escalate privileges or disrupt security functions without admin rights; BlueHammer is patched, but RedSun and UnDefend remain unpatched zero-days.
  • Huntress detected initial BlueHammer use on April 10, 2026, with escalating activity including RedSun and UnDefend executions; none of the privilege escalation attempts succeeded due to active remediation.
  • The attacker accessed the victim network from multiple geolocated IPs, indicating credential abuse, and deployed a covert TCP relay tool, BeigeBurrow, which successfully established persistent outbound connections over port 443.
  • Huntress advises immediate patching, thorough investigation of user-writable directories and VPN logs, blocking suspicious tunneling domains, and monitoring for post-exploitation commands; a YARA rule for detecting BeigeBurrow has been publicly released.

Trending Business

Trending Technology

Trending Health