Mystery Microsoft bug leaker keeps the zero-days coming

TL;DR

An unidentified security researcher, known as Nightmare-Eclipse or Chaotic Eclipse, has released details of two new Windows zero-day vulnerabilities, YellowKey and GreenPlasma, shortly after Microsoft’s Patch Tuesday updates. This marks the latest in a series of disclosures that threaten to undermine Windows security.

An anonymous security researcher known as Nightmare-Eclipse has revealed two new Windows zero-day vulnerabilities, YellowKey and GreenPlasma, just after Microsoft’s recent Patch Tuesday. The disclosures, which include technical details and partial exploit code, heighten concerns about ongoing security risks and the potential for malicious exploitation.

Nightmare-Eclipse has publicly shared details of YellowKey, a flaw that allows bypassing BitLocker encryption with physical access, and GreenPlasma, a privilege escalation vulnerability that could give attackers SYSTEM-level control. The researcher described YellowKey as ‘one of the most insane discoveries I ever found,’ providing files that enable attackers to load onto a USB drive and gain unrestricted shell access if the sequence is correctly entered.

Experts warn that, despite requiring physical access, YellowKey significantly increases risks for stolen laptops, as bypassing BitLocker effectively renders the encryption ineffective. Rik Ferguson, VP of security intelligence at Forescout, stated, ‘If [the claim] holds up, a stolen laptop stops being a hardware problem and becomes a breach notification.’ Cyber threat analysts note that implementing additional security measures like PINs and BIOS passwords can mitigate YellowKey. Meanwhile, GreenPlasma, which is only partially exploitable in its current form, could be weaponized to escalate privileges once a system is compromised, according to security professionals.

Why It Matters

This development is significant because it underscores the persistent threat posed by zero-day vulnerabilities and the potential for malicious actors to exploit them. The disclosures come amid ongoing concerns about security vulnerabilities that can be weaponized for data theft, ransomware, or unauthorized access. The fact that the researcher has released multiple exploits this year suggests a campaign that could undermine trust in Windows security and complicate patch management for organizations.

Amazon

USB exploit prevention device

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

Background

Nightmare-Eclipse, also known as Chaotic Eclipse, first emerged as a security researcher who released proof-of-concept exploits for Windows vulnerabilities earlier this year, including BlueHammer, RedSun, and UnDefend. The leaks followed an apparent personal grievance, with the researcher claiming breaches of trust and a desire to retaliate against Microsoft. The previous disclosures have already been exploited in the wild, prompting Microsoft to issue patches for some, but not all, of these vulnerabilities.

YellowKey and GreenPlasma are the latest in a series of five zero-days disclosed this year. The researcher has indicated that more exploits are available, potentially with a ‘dead man’s switch’ ready to activate, suggesting an ongoing campaign of disclosures and potential attacks.

“If [the researcher’s claim] holds up, a stolen laptop stops being a hardware problem and becomes a breach notification.”

— Rik Ferguson, VP of security intelligence at Forescout

“YellowKey remains a huge security problem for organizations using BitLocker. It can be mitigated by implementing a PIN and BIOS password.”

— Gavin Knapp, cyber threat intelligence lead at Bridewell

“The same post linking yesterday’s releases warns of another Patch Tuesday surprise and hints at future RCE disclosures. They claim to have a dead man’s switch with more ready to go.”

— Ferguson

4 Sets Sliding Window Locks with Key, Window Locks for Up and Down Windows,Easy to Install Vertical & Horizontal Window Security Locks,Adjustable Aluminum Window Stopper Lock(Silver)

4 Sets Sliding Window Locks with Key, Window Locks for Up and Down Windows,Easy to Install Vertical & Horizontal Window Security Locks,Adjustable Aluminum Window Stopper Lock(Silver)

🖼【Measure your window track】This window lock is suitable for sliding windows, sliding doors and vertical windows. Before ordering…

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

What Remains Unclear

It is not yet clear whether Microsoft will release patches addressing YellowKey and GreenPlasma in upcoming updates. The full technical details and exploit code for GreenPlasma are incomplete, requiring further analysis to determine the actual risk level. The credibility of the researcher’s claims and the potential for active exploitation remain under assessment.

Password Reset Key II Next Generation - USB 3.0 Key Works w/Windows 98, 2000, XP, Vista, 7, & 10 - Fast Access No Internet Connection Needed - Reset Lost Passwords on Windows Based PC & Laptop

Password Reset Key II Next Generation – USB 3.0 Key Works w/Windows 98, 2000, XP, Vista, 7, & 10 – Fast Access No Internet Connection Needed – Reset Lost Passwords on Windows Based PC & Laptop

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

What’s Next

Microsoft has not publicly commented on these disclosures. Security experts expect the company to investigate the vulnerabilities and potentially include fixes in future Patch Tuesday releases. Organizations are advised to review security protocols and consider mitigations for physical access attacks, such as BIOS passwords and PIN protections.

Amazon

BitLocker encryption bypass protection

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

Key Questions

Are these vulnerabilities already being exploited in the wild?

There is currently no confirmed evidence of active exploitation. However, the researcher has provided technical details and partial code, which could be weaponized by attackers once analyzed.

Will Microsoft patch these vulnerabilities?

Microsoft has not yet announced any patches. It is possible they will address these in upcoming security updates if the vulnerabilities are confirmed and deemed critical.

What can organizations do to protect themselves?

Organizations should implement additional security measures such as BIOS passwords, BitLocker PINs, and physical security controls. Monitoring for unusual activity and applying patches promptly remain essential.

Who is the researcher behind these disclosures?

The individual is known as Nightmare-Eclipse or Chaotic Eclipse, and they have a history of releasing Windows vulnerabilities, citing personal grievances and trust violations as motivations.

You May Also Like

Googlebook

Google announces Googlebook, an AI-integrated digital notebook platform combining advanced AI features with seamless device integration, launching this fall.

If AI writes your code, why use Python?

As AI increasingly writes code, experts question why Python remains the preferred language, prompting a reevaluation of programming choices.

Building for the future

Cloudflare announces a global reduction of over 1,100 employees to prioritize AI development and future growth, emphasizing transparency and support for departing staff.

The Truth About Smart Home “Hubs” (And When You Actually Need One)

Discover the truth about smart home hubs and learn when they are truly necessary for your automation needs.