Disgruntled Researcher Releases 2 More Microsoft Zero-Days

Another Wave of Windows Vulnerabilities Hits the Security Community

An anonymous figure known as Nightmare-Eclipse, who also operates under the alias Chaotic Eclipse, has once again grabbed the attention of the cybersecurity world. This individual has released details about two fresh security holes in Microsoft Windows, bringing the total number of exposed vulnerabilities to five in 2025 alone. Security professionals are now scrambling to assess the damage and warn users about what these disclosures mean for everyday computing.

microsoft zero-day exploits

The two newly revealed flaws carry the names YellowKey and GreenPlasma. YellowKey targets BitLocker, Microsoft’s full-disk encryption tool designed to protect data on lost or stolen devices. GreenPlasma, on the other hand, is a privilege escalation vulnerability that could give attackers higher-level system access. Together, they represent a serious one-two punch for anyone relying on Windows security features to keep sensitive information safe.

Understanding YellowKey: The BitLocker Bypass

BitLocker has long been considered a reliable last line of defense for Windows machines. When a laptop goes missing, organizations hope that encryption will keep their data out of reach. YellowKey threatens to dismantle that assumption. According to the researcher’s documentation, this flaw allows an attacker to bypass BitLocker entirely using a specially prepared USB drive. Once the correct key sequence is entered, the attacker gains unrestricted shell access to a machine that was supposed to be fully protected.

How YellowKey Works

The exploit requires a few specific conditions. First, the attacker must have physical access to the target computer. Second, they need a USB drive loaded with the files provided by the researcher. Third, they must execute the precise key sequence that triggers the bypass. If all three conditions are met, BitLocker’s encryption is effectively neutralized, and the system’s data becomes readable.

Security experts who have examined the available information describe YellowKey as unusually disruptive. Rik Ferguson, vice president of security intelligence at Forescout, framed the risk in stark terms. If the researcher’s claim holds up, a stolen laptop stops being a hardware problem and becomes a breach notification. That shift in severity matters. A lost device traditionally meant replacing hardware and resetting passwords. With YellowKey in play, that same device could expose client records, financial documents, or proprietary code.

Why Physical Access Still Matters

Some observers might downplay YellowKey because it requires physical access. After all, most cyberattacks today originate from remote locations across the internet. But physical access attacks remain a genuine threat for specific groups. Traveling sales representatives, field engineers, government workers, and executives frequently carry laptops through airports, hotels, and conference centers. A device left unattended for just a few minutes could be compromised. Even a lost backpack creates a serious risk that was previously mitigated by BitLocker encryption.

Gavin Knapp, cyber threat intelligence principal lead at Bridewell, described YellowKey as a huge security problem for organizations using BitLocker. His assessment reflects a broader concern among incident responders who see physical theft as an underappreciated attack vector. When encryption no longer serves as a reliable safety net, every stolen device demands an immediate and thorough investigation.

Mitigation Strategies for YellowKey

The good news is that defenses exist. Knapp noted that adding a BitLocker PIN and a BIOS password lock can effectively neutralize the YellowKey exploit. These two measures force an attacker to authenticate before the system even attempts to boot from external media. Without those credentials, the USB-based bypass cannot proceed.

Organizations should follow these steps to implement protection:

  • Enable a BitLocker startup PIN through Group Policy or local security settings. This PIN must be entered each time the computer starts.
  • Set a BIOS or UEFI administrator password to prevent unauthorized changes to boot order or security settings.
  • Disable booting from external devices unless absolutely necessary, and restrict USB access through additional policies.
  • Audit physical security procedures for all devices that store sensitive data, especially those that travel frequently.

These steps are not difficult to implement, but they require proactive configuration. Organizations that delay may find themselves exposed if YellowKey is weaponized in a real attack.

GreenPlasma: The Privilege Escalation Flaw

The second vulnerability disclosed by the researcher goes by the name GreenPlasma. Unlike YellowKey, this flaw does not require physical access. Instead, it targets Windows User Account Control mechanisms and could allow an attacker already present on a system to elevate their privileges to the highest level.

How GreenPlasma Operates

The researcher published partial exploit code rather than a fully weaponized proof of concept. That distinction matters. Rik Ferguson explained that attackers would need to take the provided code and figure out how to weaponize it themselves, which is no small task. In its current state, GreenPlasma triggers a UAC consent prompt in default Windows configurations. A silent exploit remains a work in progress, meaning the flaw is not yet ready for seamless deployment in real attacks.

But partial code still represents a head start for malicious actors. Skilled threat groups can take the researcher’s work, identify the remaining gaps, and develop a working exploit. The window between disclosure and weaponization could be measured in weeks rather than months.

The Real Danger of Privilege Escalation

GreenPlasma fits into a category of vulnerability that attackers prize above many others. Privilege escalation flaws are frequently used after an attacker has already gained an initial foothold in a victim’s system. Once inside, the attacker uses a tool like GreenPlasma to elevate their access from a standard user to a system-level administrator. At that point, the possibilities expand dramatically.

Gavin Knapp described the typical progression in clear terms. These elevation of privilege vulnerabilities are often weaponized during post-exploitation to enable threat actors to discover and harvest credentials and data, before moving laterally to other systems, prior to end goals such as data theft or ransomware deployment. This pattern has been observed in countless real-world incidents, from corporate breaches to ransomware outbreaks that disrupted hospitals and schools.

Why No Mitigation Exists Yet

At the time of writing, Microsoft has not released a patch for GreenPlasma. Knapp stated plainly that currently there is no known mitigation for GreenPlasma. He added that it will be important to patch when Microsoft addresses the issue. Until that patch arrives, organizations must rely on broader security practices to reduce their exposure. These include enforcing least-privilege principles, monitoring for unusual privilege escalation attempts, and maintaining robust endpoint detection systems that can flag suspicious behavior.

The absence of a mitigation makes GreenPlasma especially concerning for security teams. They cannot block the vulnerability directly. They can only watch for signs that someone is trying to exploit it and respond quickly if an attempt occurs.

The Researcher’s Retaliatory Campaign

YellowKey and GreenPlasma did not emerge from a standard responsible disclosure process. They are part of an escalating campaign by an individual who feels wronged by Microsoft. Understanding the researcher’s motivations helps explain the unusual release pattern and suggests that more leaks may be coming.

A History of Leaks in 2025

Nightmare-Eclipse first gained attention earlier this year with the release of BlueHammer, tracked as CVE-2026-32201 with a CVSS score of 6.5. Microsoft patched that vulnerability in its April update. But the researcher was not done. In early April, they leaked proof of concept code for two Windows Defender exploits called RedSun and UnDefend, the latter being another admin privilege escalation bug. Both RedSun and UnDefend remain unpatched at the time of this writing, and security teams have reported that they were quickly exploited in real-world attacks.

YellowKey and GreenPlasma bring the total to five disclosed vulnerabilities in a single year from one anonymous source. That volume is almost unprecedented outside of organized bug bounty programs or academic research groups.

The Alleged Trust Violation

In a blog post published under the Chaotic Eclipse alias, the researcher explained their reasons for going public with these flaws. The post stated that the leak campaign began after an alleged violation of trust. The researcher wrote that they never wanted to reopen a blog or create a new GitHub account to drop code. But someone violated an agreement and left them homeless with nothing. They claimed that the other party knew this would happen and stabbed them in the back anyway, calling the leaks a consequence of that decision rather than a choice they made freely.

You may also enjoy reading: Save $150: The Best Breville Coffee Machine Deal Now.

These claims have fueled speculation about the researcher’s identity and their past relationship with Microsoft. Rumors have circulated that the individual may be a former Microsoft employee, but no confirmation exists. The people we spoke to said it was impossible to verify the backdoor claim based on the information available.

The Dead Man’s Switch Threat

Perhaps the most alarming detail in the researcher’s communications is the mention of a dead man’s switch. According to the researcher, an automated mechanism has been configured to release additional zero-day disclosures even if they are stopped or incapacitated. This threat raises the stakes considerably. It means that traditional approaches to dealing with malicious disclosure, such as legal action or account takedowns, may not prevent future leaks. The researcher has positioned themselves as a moving target with a fail-safe designed to ensure continued damage regardless of what happens to them personally.

Timing After Patch Tuesday: A Deliberate Strategy

The decision to release YellowKey and GreenPlasma immediately after Microsoft’s monthly Patch Tuesday update was not accidental. Security researchers and threat actors alike pay close attention to this cadence. Patch Tuesday is when Microsoft releases its scheduled security fixes. By waiting until after that date, the researcher ensured that their disclosures would not be overshadowed by Microsoft’s own announcements. More importantly, they guaranteed that at least one full month would pass before Microsoft could address the vulnerabilities in a future Patch Tuesday cycle.

This timing maximizes the damage window. Organizations that rely on Microsoft’s monthly updates as their primary patching rhythm now face an uncomfortable gap. They know about the vulnerabilities. They know that exploit code exists. But they cannot obtain an official fix until the next update cycle at the earliest. For many IT teams, this situation creates pressure to implement workarounds or temporary controls even before Microsoft releases a patch.

Practical Steps for Organizations

Reading about zero-day disclosures can feel unsettling, especially when the vulnerabilities affect products as widely used as Windows. But organizations can take concrete actions to reduce their risk without waiting for Microsoft to ship updates.

For IT Administrators

If you manage a fleet of company laptops, start by auditing your BitLocker configuration. Verify whether startup PINs are enabled and enforced through Group Policy. Check BIOS password settings on all devices. Consider implementing additional controls such as Windows Defender Application Control or AppLocker to limit what software can run on your systems. These measures will not stop every attack, but they make it significantly harder for an attacker to move from initial access to full compromise.

For GreenPlasma specifically, review your organization’s privilege management practices. Ensure that standard users do not have administrative rights. Deploy endpoint detection and response tools that can alert on unusual privilege escalation attempts. Conduct tabletop exercises that simulate a post-exploitation scenario to test your team’s ability to detect and respond before data exfiltration occurs.

For Traveling Professionals

If you frequently travel with a Windows laptop containing sensitive information, treat physical security with renewed seriousness. Never leave your device unattended in public places. Use a laptop lock when working in shared spaces. Consider using a privacy screen to prevent shoulder surfing. Enable your BitLocker PIN if your organization allows it, and ensure your BIOS password is set. These small habits add layers of protection that can make the difference between a lost device and a data breach.

For Security Managers

The cascading series of disclosures from this researcher should prompt a broader conversation about your organization’s reliance on any single security control. BitLocker was never meant to be the only safeguard for sensitive data. It works best as part of a defense-in-depth strategy that includes strong authentication, network segmentation, data loss prevention, and user awareness training. Review your incident response plan to ensure it accounts for scenarios involving physical device theft combined with encryption bypass. If your plan assumes that encryption protects everything, now is the time to update it.

The Broader Implications for Vulnerability Disclosure

This episode raises uncomfortable questions about how the security industry handles disputes between researchers and vendors. Responsible disclosure norms encourage researchers to report vulnerabilities privately and give vendors time to develop patches. When that process breaks down, as it appears to have done here, the results can be damaging for everyone except malicious actors.

Some observers argue that Microsoft could have prevented this situation by maintaining better relationships with the researcher community. Others contend that no amount of process can stop a motivated individual determined to cause harm. Regardless of where one stands on that debate, the practical outcome remains the same. A series of dangerous microsoft zero-day exploits have been released into the wild, and organizations must adapt quickly to defend against them.

The history of prior disclosures shows that when this researcher releases exploit code, real attackers put it to use. RedSun and UnDefend were both incorporated into active attacks within weeks of their publication. There is no reason to believe YellowKey and GreenPlasma will be treated differently. Security teams should monitor threat intelligence feeds for signs of weaponized versions and prepare their defenses accordingly.

For now, the cybersecurity community watches and waits. Microsoft has not officially commented on whether it plans to address YellowKey and GreenPlasma in an out-of-band update or wait for the next Patch Tuesday. Organizations that take proactive steps today will be better positioned to weather whatever comes next. The researcher’s dead man’s switch suggests that this story is far from over, and the next disclosure may already be in motion.

Add Comment