Security researcher says Microsoft built a BitLocker backdoor, releases exploit

· security ai privacy · Source ↗

TLDR

  • Researcher Nightmare-Eclipse released YellowKey, a BitLocker full-volume encryption bypass triggered via a USB-attached FsTx folder and WinRE reboot sequence.

Key Takeaways

  • YellowKey works by copying an FsTx folder to a USB (NTFS, FAT32, or exFAT) or the EFI partition, rebooting into Windows Recovery Environment, and following a specific input sequence to get an unrestricted command shell.
  • The bypass requires no password and grants full read/write access to BitLocker-protected volumes; only Windows 11, Server 2022, and Server 2025 are affected, not Windows 10.
  • The triggering component exists only in official WinRE images; the same component in standard Windows install images does not exhibit the bypass, which the researcher calls evidence of intentional backdoor insertion.
  • Nightmare-Eclipse also released GreenPlasma, a privilege escalation exploit, and hinted at a PIN-bypassing variant to be disclosed before next Patch Tuesday.
  • Mitigation advice from the source: layer encryption systems and consider VeraCrypt as an alternative to BitLocker.

Hacker News Comment Review

  • Commenters clarified that YellowKey targets TPM-only BitLocker (no PIN), where WinRE holds a TPM-released decryption key, making physical access sufficient regardless of this specific exploit.
  • The mechanism appears to involve Transactional NTFS (TxF) bits on a USB deleting winpeshl.ini on a separate drive inside WinRE, a subtle privilege boundary violation rather than a classic FDE break.
  • Commenters debated intentionality: the “backdoor” framing is contested given the researcher’s public grudge against Microsoft and the fact that PIN-protected BitLocker is reportedly unaffected by the published PoC.

Notable Comments

  • @layer8: Published exploit does not affect BitLocker with a PIN; PIN-less TPM-only mode was already considered weak against physical attackers.
  • @gruez: WinRE is privileged because Windows stores a TPM-released decryption key specifically for the recovery environment, which is why WinRE access is the attack’s prerequisite.

Original | Discuss on HN