Microsoft BitLocker – YellowKey zero-day exploit

Hacker News Top News

Summary

A security researcher released a zero-day exploit called YellowKey that bypasses Microsoft BitLocker encryption on Windows 11 and Windows Server 2022/2025, allowing full access to locked drives using a USB stick; the exploit appears to operate as a backdoor, with files disappearing after use.

No content available
Original Article Export to Word Export to PDF
View Cached Full Text

Cached at: 05/14/26, 06:21 AM

# Microsoft BitLocker-protected drives can now be opened with just some files on a USB stick — YellowKey zero-day exploit demonstrates an apparent backdoor Source: [https://www.tomshardware.com/tech-industry/cyber-security/microsoft-bitlocker-protected-drives-can-now-be-opened-with-just-some-files-on-a-usb-stick-yellowkey-zero-day-exploit-demonstrates-an-apparent-backdoor](https://www.tomshardware.com/tech-industry/cyber-security/microsoft-bitlocker-protected-drives-can-now-be-opened-with-just-some-files-on-a-usb-stick-yellowkey-zero-day-exploit-demonstrates-an-apparent-backdoor) ![Falling laptop cracking](https://cdn.mos.cms.futurecdn.net/NoMA8eAVErtvRS5rFYuiQm.jpg)\(Image credit: Getty Images\) There's nothing more dangerous than a bored engineer with a screwdriver, and hell hath no fury like a[security](https://www.tomshardware.com/tag/security)researcher scorned\. Last month, Security researcher[Chaotic Eclipse](https://deadeclipse666.blogspot.com/)\(aka[Nightmare\-Eclipse](https://github.com/Nightmare-Eclipse/)\) published two zero\-day exploits,[BlueHammer](https://www.cyderes.com/howler-cell/windows-zero-day-bluehammer)and[RedSun](https://github.com/Nightmare-Eclipse/RedSun), that made Windows Defender offer up system administrator privileges\. They did this after their disclosure reports were[allegedly dismissed](https://deadeclipse666.blogspot.com/2026/04/public-disclosure-response-for-cve-2026.html)by Microsoft's security team, resulting in a vendetta of sorts\. Eclipse has now done it again, posting two new zero\-day exploits, the first one an extremely serious BitLocker exploit named Yellow Key that grants full access to a locked drive\. The second one, GreenPlasma, doesn't have a complete proof\-of\-concept \(PoC\), but it allegedly performs a local privilege escalation and gains system\-level access\. Given Eclipse's track record, it's a fair bet that it works as advertised\. YellowKey can be triggered simply by merely copying some files to a USB stick and rebooting to the Windows Recovery Environment\. We tested this ourselves, and sure enough, not only does it work, it bears all the hallmarks of a backdoor, down to the exploit's files disappearing from the USB stick after it's used once\. ![YellowKey Bitlocker exploit](https://cdn.mos.cms.futurecdn.net/rEY5giBuj6UnfiXHaZrkoa.png) Look ma, no keys\!\(Image credit: Future\)To say that this is dangerous is an understatement\. Not only is it an immediate concern as BitLocker cannot be trusted for encrypting drives, but the way the exploit executes and its files disappear also raises very uncomfortable corporate and/or political questions\. YellowKey also[reportedly](https://securityonline.info/windows-bitlocker-bypass-yellowkey-greenplasma-poc-disclosure/)works in Windows Server 2022 and 2025, but not in Windows 10\. BitLocker protects millions of machines worldwide across home, enterprises, and governments, especially as it's enabled by default in[Windows 11](https://www.tomshardware.com/tag/windows-11)\. As far as we can tell, a drive can't be taken from machine Alice and opened in machine Bob because the encryption keys are in Alice's TPM, but it's not hard to just up and steal a laptop, mini\-PC, or even desktop\. [Eclipse notes](https://deadeclipse666.blogspot.com/2026/05/were-doing-silent-patches-now-huh-also.html)that using a full TPM\-and\-PIN setup doesn't help, as apparently, they have a variant for that scenario that they haven't published a PoC for\. They also state the vulnerability is well\-hidden, and that they "could have made some insane cash selling this, but no amount of money will stand between me and my determination against[Microsoft](https://www.tomshardware.com/tag/microsoft)\." As for GreenPlasma, it's supposed to get an attacker full system\-level access \(even higher than administrator\) by manipulating the CTFMon process into placing a crafted memory section object — a slice of memory that can be shared between processes or mapped to a file — in any Windows' Object Manager section the SYSTEM user has write access to, bypassing regular access controls\. Get Tom's Hardware's best news and in\-depth reviews, straight to your inbox\. From thereon, the exploit code can get access to regions of memory they're not meant to and leverage that for any number of shenanigans, the most obvious one being getting full system access\. This is bad enough for a desktop system, as any program can get full access, but it's particularly bad for server environments, where any regular user can get control of the server and, by extension, everyone else's data\. Meanwhile, as of this writing, there is no official response from the company about YellowKey or GreenPlasma\. BlueHammer has already been patched, and Chaotic claims that Microsoft silently patched RedSun, but there's no official word on that either\. [![Google Preferred Source](https://cdn.mos.cms.futurecdn.net/7cUTDmN2PHNRiNBVqbKf56.png)](https://news.google.com/publications/CAAqLAgKIiZDQklTRmdnTWFoSUtFSFJ2YlhOb1lYSmtkMkZ5WlM1amIyMG9BQVAB)*Follow*[*Tom's Hardware on Google News*](https://news.google.com/publications/CAAqLAgKIiZDQklTRmdnTWFoSUtFSFJ2YlhOb1lYSmtkMkZ5WlM1amIyMG9BQVAB)*, or*[*add us as a preferred source*](https://google.com/preferences/source?q=)*, to get our latest news, analysis, & reviews in your feeds\.* Bruno Ferreira is a contributing writer for Tom's Hardware\. He has decades of experience with PC hardware and assorted sundries, alongside a career as a developer\. He's obsessed with detail and has a tendency to ramble on the topics he loves\. When not doing that, he's usually playing games, or at live music shows and festivals\.

Similar Articles

YellowKey Bitlocker Bypass Vulnerability

Lobsters Hottest

YellowKey is a proof-of-concept exploit that bypasses BitLocker encryption on Windows 11 by leveraging a vulnerability in the Windows Recovery Environment, allowing unrestricted access to protected volumes.

Mystery Microsoft bug leaker keeps the zero-days coming

Hacker News Top

An anonymous researcher released two Microsoft zero-day exploits, YellowKey (BitLocker bypass) and GreenPlasma (privilege escalation), after Patch Tuesday, posing serious security risks for organizations.

Unlocking Encrypted ZFS Volumes with a Passkey

Lobsters Hottest

The article introduces Revaulter v2, a tool that enables unlocking encrypted ZFS volumes at boot using passkeys (WebAuthn), allowing remote approval via a mobile web interface without storing keys in plaintext.

The zero-days are numbered

Lobsters Hottest

Mozilla used Anthropic's Claude Mythos Preview AI to find and fix 271 zero-day vulnerabilities in Firefox 150, marking a major shift in cybersecurity where AI enables defenders to decisively outpace attackers.