Key Takeaways
- Two new Windows zero-day vulnerabilities, YellowKey (a BitLocker bypass) and GreenPlasma (a privilege escalation flaw), were disclosed by the anonymous researcher Nightmare-Eclipse (Chaotic Eclipse), requiring physical access to exploit.
- YellowKey poses a severe risk for stolen laptops, as bypassing BitLocker (Windows’ encryption last line of defense) transforms device theft into a potential data breach, necessitating breach notifications if exploited.
- Mitigation for YellowKey is possible via configuring a BitLocker PIN and enabling a BIOS/UEFI password, though experts note its potential as a backdoor remains unverified.
- GreenPlasma currently lacks a known mitigation; its partial exploit code requires weaponization by attackers (triggering a UAC prompt by default), making silent exploitation a work in progress, though such flaws are commonly used post-compromise for credential theft and lateral movement.
- This disclosure marks the researcher’s fifth zero-day of the year (following BlueHammer, RedSun, and UnDefend), part of an alleged retaliatory campaign against Microsoft, with warnings of further disclosures including potential RCE flaws via a claimed "dead man’s switch."
Security Pros Warn YellowKey Claim Could Make Stolen Laptops a Much Bigger Problem
An anonymous security researcher, operating under the aliases Nightmare-Eclipse or Chaotic Eclipse, has disclosed two additional Windows zero-day vulnerabilities shortly after Microsoft’s monthly Patch Tuesday update. The researcher, who has already exposed three zero-days this year, revealed details about YellowKey and GreenPlasma. YellowKey is described as a method to bypass BitLocker drive encryption, while GreenPlasma is characterized as a privilege escalation flaw capable of granting SYSTEM-level access to an attacker. The release included substantial technical information and files, prompting immediate concern from security experts who emphasized the seriousness of these flaws, particularly given the researcher’s history of credible disclosures.
YellowKey: A Potentially Devastating BitLocker Bypass Requiring Physical Access
The researcher characterized YellowKey as "one of the most insane discoveries I ever found," providing specific files designed to be loaded onto a USB drive. According to the disclosure, if an attacker with physical access to a Windows PC completes a precise key sequence using this USB drive, they can gain unrestricted shell access to a machine protected by BitLocker encryption. While acknowledging the critical requirement of physical access (which limits remote exploit potential), experts stressed that this detail does not diminish the severity for a common and high-impact scenario: stolen or lost laptops. BitLocker serves as Microsoft’s primary safeguard for data confidentiality when devices fall into unauthorized hands; bypassing it effectively nullifies this last line of defense.
Experts Highlight Stolen Device Risk as Breach Notification Trigger
Rik Ferguson, Vice President of Security Intelligence at Forescout, issued a stark warning regarding YellowKey’s implications. He stated that if the researcher’s claim holds true, "a stolen laptop stops being a hardware problem and becomes a breach notification." This underscores the paradigm shift: instead of merely losing the physical device (a costly but containable incident), organizations now face the very real possibility that sensitive encrypted data on the laptop could be accessed and exfiltrated by thieves, triggering regulatory breach notification requirements under laws like GDPR or CCPA. The potential for stolen devices to directly lead to data compromise elevates the risk profile significantly for any organization relying on BitLocker for laptop security.
Mitigation Strategies for YellowKey Emphasized by Experts
Despite the alarming nature of YellowKey, cybersecurity professionals outlined concrete steps organizations can take to reduce risk. Gavin Knapp, Cyber Threat Intelligence Principal Lead at Bridewell, confirmed that YellowKey remains "a huge security problem for organizations using BitLocker" due to the physical access vector. However, he cited information from cyber threat intelligence circles indicating that implementing two specific defenses can mitigate the threat: configuring a BitLocker PIN (requiring pre-boot authentication) and setting a BIOS/UEFI password (preventing unauthorized boot device changes or firmware access). These layers add significant hurdles for an attacker attempting the USB-based key sequence, as they would need to bypass both the pre-boot PIN and the firmware protection before even attempting the YellowKey exploit. Knapp stressed that these mitigations are crucial and actionable immediately.
GreenPlasma: Privilege Escalation Flaw Requires Weaponization
Regarding the second vulnerability, GreenPlasma, the researcher published only partial exploit code rather than a fully functional proof-of-concept (PoC). Ferguson noted that attackers would need to take this provided code and invest significant effort to weaponize it themselves. In its current state, the code triggers a User Account Control (UAC) consent prompt under default Windows configurations, meaning a silent, undetectable exploit is not yet feasible and remains "a work in progress." Knapp provided critical context for why such flaws are still highly dangerous, explaining that privilege escalation vulnerabilities like GreenPlasma are frequently exploited after an attacker gains an initial foothold on a system (e.g., via phishing or malware). Once inside, attackers use these elevation flaws to gain SYSTEM privileges, enabling them to harvest credentials, access sensitive data, move laterally across the network, and ultimately pursue goals like data theft or ransomware deployment. He emphasized that "currently, there is no known mitigation for GreenPlasma" and urged organizations to prioritize patching once Microsoft addresses the issue.
Researcher’s History Escalates Concerns About Future Disclosures
YellowKey and GreenPlasma represent the latest in a series of five Microsoft zero-day vulnerabilities disclosed by Nightmare-Eclipse this year. The researcher’s activity began with the leak of BlueHammer (CVE-2026-32201) in April, which was subsequently patched by Microsoft. Nightmare-Eclipse has framed this campaign as retaliatory, alleging in a blog post under the Chaotic Eclipse alias that it commenced after an alleged violation of trust that left them "homeless with nothing." Earlier in April, they leaked PoC code for RedSun (an admin privilege escalation bug) and UnDefend (a denial-of-service flaw), alongside BlueHammer. Notably, Huntress reported that the proof-of-concept code for RedSun and UnDefend was rapidly picked up and abused in real-world attacks, despite remaining unfixed by Microsoft at the time of the YellowKey/GreenPlasma disclosure. Ferguson characterized the latest releases as part of an "escalating, retaliatory campaign" against Microsoft, highlighting that prior disclosures like BlueHammer and RedSun garnered serious community attention and led to real-world exploit forks. He warned that the researcher’s post linking yesterday’s releases hinted at "another Patch Tuesday surprise" and future remote code execution (RCE) disclosures, claiming the researcher possesses a "dead man’s switch" with more vulnerabilities ready to deploy and has "followed through on every prior threat."
Conclusion: Persistent Threat Demands Vigilance
The disclosure of YellowKey and GreenPlasma by Nightmare-Eclipse underscores an ongoing and sophisticated threat landscape targeting Windows systems. While YellowKey’s reliance on physical access limits its remote exploitability, its potential to turn stolen laptops into direct data breach vectors necessitates immediate organizational focus on strengthening BitLocker configurations with PINs and BIOS passwords. GreenPlasma, though currently requiring weaponization, represents a dangerous post-exploitation tool that attackers will likely integrate into their toolkits once a reliable exploit is developed. The researcher’s established pattern of credible disclosures, history of real-world exploit adoption for prior vulnerabilities, and explicit threats of further releases demand that security teams remain vigilant, prioritize patch management, implement defense-in-depth strategies (especially for endpoint encryption), and treat any hint of future disclosures from this source with utmost seriousness. The situation serves as a stark reminder that the security of encrypted data on endpoints is only as strong as the layers protecting it, and determined adversaries continue to seek and exploit weaknesses in those defenses. (Word Count: 998)

