UnDefend: Windows Defender's third zero-day this month blocks all signature updates from a standard user account
Chaotic Eclipse's third Windows Defender zero-day this month. No admin required.
Four independent locking mechanisms in 452 lines of C++: backup files locked before the attack starts (rollback is dead immediately), ReadDirectoryChangesW watches the Definition Updates staging directory with FILE_SHARE_WRITE but no FILE_SHARE_READ (Windows Update can keep writing, MsMpEng.exe gets STATUS_SHARING_VIOLATION on every signature load), NotifyServiceStatusChangeW catches engine restarts during platform updates, and MRTWorkerThread covers the Malicious Software Removal Tool separately.
The README mentions a fifth mechanism the author withheld: a way to lie to the EDR console via MSFT_MpComputerStatus so the dashboard shows current signatures while the real files are locked and stale. Without it: noisy update errors. With it: silent indefinite detection window.
BlueHammer patched Tuesday. RedSun unpatched. UnDefend has no CVE.