ndiddy 1 day ago

I think the Bitlocker "vuln" is a good reminder not to use vendor provided encryption for any sensitive data. https://github.com/Nightmare-Eclipse/YellowKey/ You load a specific file onto a flash drive, plug it into a Bitlocker encrypted computer, reboot it while holding a key combination, and it pops up a command prompt with full access to the encrypted volume. There's no way this isn't a backdoor.

  • otterley 1 day ago

    > I think the Bitlocker "vuln" is a good reminder not to use vendor provided encryption for any sensitive data

    I don't think that's true. Some vendors have a better track record than others. Nobody's popped the storage encryption on iOS or MacOS devices yet AFAIK; and the fact that it's tied to a hardware secure element makes it pretty strong.

    • thefz 1 day ago

      You mean aside from the NSA? https://en.wikipedia.org/wiki/PRISM

      • otterley 1 day ago

        I don't see anything on the linked page that supports a conclusion that NSA has successfully broken the encryption at rest of an Apple device's storage since they introduced the secure element.

        Care to share a quote?

        • ffsm8 1 day ago

          Prism targeted network communication to my knowledge, hence the data wouldn't be siphoned from at rest encrypted devices. Instead it would've been leaked before it was copied to that local encrypted device, whenever it was transmitted over the wire. Eg when your background task uploaded it to iCloud or similar.

          • dcrazy 1 day ago

            It’s worth remembering that since Snowden, much of iCloud is now end-to-end encrypted using keys that Apple cannot unwrap: https://support.apple.com/guide/security/secure-icloud-keych...

            • ffsm8 1 day ago

              Fwiw, that's a clear statement - but only that.

              There is no way for us, the users, to know wherever they have the capability to add additional keys to decrypt the data because the platform isn't open source and doesn't have attestation wrt what's actually serving the requests.

              And it's worth remembering that apple had similar articles published before prism too which were ultimately proven to be groundless by prism.

              • otterley 1 day ago

                What, exactly, was proven to be groundless?

              • dcrazy 20 hours ago

                The whole thing relies on hardware security modules, so even if you can prove that the whole software stack is working as described, there is literally no way to know that the SE isn’t secretly handing the OS keys that a third party can decrypt.

                There needs to be trust at some level, and trust in Apple the entity to not be outright lying about its thoroughly documented security posture is a reasonable level of trust for most people on the planet, including those who are at very real risk of targeted attack by state-level actors.

    • Veserv 1 day ago

      Ah yes, the bizarro world where systems are normally unhackable so the default assumption is impenetrable security and you need to prove they are insecure.

      Thank god this is not the world where things get hacked all the time and where any claim of meaningful security is a extraordinary claim that demands extraordinary evidence and proof before credibly asserting it, but everybody just ignores that part and just pinky promises it and everybody just believes them for the 104th time without evidence.

    • jiggawatts 1 day ago

      Microsoft quietly dropped support for encryption offload support ("OPAL") in SSD drives because the hardware vendors were doing absolute clown-shoes things like a single static hard-coded key or the key was literally empty / all zeroes!

      There's levels of trust/security.

      I generally trust Apple's device encryption, assume BitLocker can be popped by a well-equipped nation state attacker, and the rest I trust about as far as I can throw them.

      PS: A related issue was (is?) that the comms between the CPU and the TPM chip on the motherboard isn't encrypted, signed, or in any significant way protected! Apparently it's relatively trivial to extract various keys including BitLocker encryption keys by simply clipping an oscilloscope to the TPM chip pins.

      Reference: https://www.techcentral.ie/windows-bitlocker-no-longer-trust...

      • kotaKat 1 day ago

        > OPAL

        Ah, yes. Wave EMBASSY Suite, Wave Preboot, and all that other hot garbage.

        Best part of Wave Systems was their horrid support organization. I loved being the tier 0 rep they contracted and trained with zero software knowledge and being a catch-and-throw for all the angry people that locked themselves out of their laptops. "Sorry, buddy, all I can do is make you a Dynamics CRM ticket."

  • aiscoming 1 day ago

    this exploit works only if you dont use a PIN/password for your Bitlocker and the volume automatically unlocks

    so it gives you access to an encrypted volume which automatically unlocks anyway

    the only difference is that it immediately gives you root access to the volume instead of having to go through the Windows login procedure - this might be a stolen laptop you dont have an account on

    • ndiddy 1 day ago

      The author claims the exploit also works with TPM+PIN, he just hasn't released the PoC:

      > Second thing is, No, TPM+PIN does not help, the issue is still exploitable regardless, I asked myself this question, can it still work in a TPM+PIN environment ? Yes it does, I'm just not publishing the PoC, I think what's out there is already bad enough.

      https://deadeclipse666.blogspot.com/2026/05/were-doing-silen...

      • aiscoming 1 day ago

        they might mean "after you enter the bitlocker PIN you get root access without having a login password on the system" - still just a privilege escalation bug

        • iscoelho 1 day ago

          That’s quite a stretch, to say the least.

          • aiscoming 1 day ago

            claiming to have a 10 times more impressive PoC but not releasing it "out of goodness of heart" is also quite a stretch

            • iscoelho 1 day ago

              Considering the researcher had already reported these to Microsoft, and delayed releasing them publicly until Microsoft "pulled every childish game possible" (quote) instead of patching them, it's not unreasonable for the researcher to be withholding another exploit from the public to limit harm.

              I also disagree that the PIN bypass would be "10 times more impressive," but that's just my professional opinion.

            • sexylinux 1 day ago

              If you think about it for some minutes you will maybe understand that there are many reasons not to publish it.

      • JeremyNT 22 hours ago

        I'm not a Windows expert but based on my understanding of how MS does this, something doesn't add up here.

        If you use bitlocker in the default, insecure way, where the TPM is configured to hand the decryption keys over to the enrolled Windows environment automatically, you can just get an LPE to access the running Windows environment after it boots. That's what I think the published exploit does. It really isn't even related to bitlocker itself, right?

        AIUI, TPM+PIN should actually mean the TPM itself cannot release the keys because the PIN hash is actually part of the key material.

        So what would a TPM+PIN exploit even look like?

        • panflute 22 hours ago

          The usual attack is in a usability feature to prevent lock out. Looking at the instructions for setup I see Bitlocker recovery code if you forget your pin.. (How does that alternative work, what are other alternative unlocks if firmware hash changes, etc, etc..)

        • ranger_danger 16 hours ago

          > you can just get an LPE to access the running Windows environment after it boots

          Or if you have physical access, you can probe the TPM chip with a SPI decoder to get the key directly: https://post-cyberlabs.github.io/Offensive-security-publicat...

          Another method is via PXE (still not patched on most systems apparently): https://github.com/andigandhi/bitpixie

          > TPM+PIN should actually mean the TPM itself cannot release the keys

          It does release the (wrapped) key actually (the above cyberlabs link explains it), it's just that the KP data this time has additional layers of encryption that are based on the PIN, which is decrypted in software after the fact. This means you can crack it offline. With the default minimum of 6 digits you can probably bruteforce it within a day.

          If you're paranoid I might suggest switching to a full password-based pre-boot auth option instead of the PIN.

  • zuzululu 1 day ago

    How does Bill Gates keep getting away with this

  • sexylinux 1 day ago

    Do you know of a backdoor for Apple FileVault?

purpleidea 1 day ago

It's so obvious that many of the bugs being found are/were most likely M$ backdoors.

There doesn't seem to be any other plausible explanation. The reckoning needs to come and people need to stop using their products for good.

Would love a whistleblower to explain which part of the government or company forced it.

  • anonymars 1 day ago

    Haven't there been heaps of vulnerabilities cropping up all over recently, including CopyFail and Dirty Frag?

    • zuzululu 1 day ago

      yeah those have shaken a lot of people's confidence in Linux and I don't really see people ditching Windows either.

      In some ways the hysteria of sorts is peculiar....its not like we never had secure cybersecurity either its just that we have too much on the cloud and institutions of trust without questioning it because of herd behavior and empty suits.

      Like the timing of all of these seemingly disparate events from "mystery lonewolf" is too obvious and I'm not the one to entertain conspiracies either.

      • Veserv 20 hours ago

        We had secure cybersecurity? When?

        I mean, there is some in the high assurance space, but that has never trickled into the broader consumer sphere. Are you referencing those systems? I am unaware of anything else.

      • BizarroLand 17 hours ago

        A LOT of people are ditching windows. The only Windows computer I have left out of 5 is a work pc.

        CachyOS is pretty amazing, too.

  • blitzar 1 day ago

    They might be incompetent

dmantis 4 hours ago

Some anon hero cleans up backdoored garbage.

This year looks very refreshing for software. My guess is because of the AI-assitance in grinding an unlimited amount of code. While I feel sorry for maintainers and developers who have a new CVE everyday, society seems to be sweeping away 20 years of backdoor development by shady companies and spies, making computing actually safe and trusted for the first time in our lifetime.

__alexander 1 day ago

So weird that GitHub requires a login to view their BlueHammer repo.

https://github.com/Nightmare-Eclipse/BlueHammer

  • tsujamin 1 day ago

    That warning also doesn’t render right on my iPhone (the buttons are overlapping slightly), and I don’t recall seeing it on other repos. Is it new/bespoke?

  • dewey 1 day ago

    I'm logged in, but I'm seeing this now and can click on "View repository" or "Explore other repositories". Maybe that's why it's behind a login wall.

    > This repository contains malicious content that may cause technical harms. We have decided to preserve this content for security research purposes. Please exercise CAUTION when clicking links, downloading releases, or otherwise interacting with this repository.

NDlurker 1 day ago

Oh cool. My brother's old laptop is locked. Maybe this will help

  • Charon77 1 day ago

    Only affects win11

    • taspeotis 1 day ago

      Windows 11 is almost 5 years old at this point

    • NDlurker 1 day ago

      Haha I texted him about this and he said he already re-installed Windows. Bad timing. It was just a couple weeks ago he told me about this.

  • lostmsu 1 day ago

    This won't work if Windows on boot is already asking for BitLocker key because it means it can't retrieve the key from TPM.

aussieguy1234 1 day ago

Could the Bitlocker vulnerability be a backdoor mandated by some government agency?

  • aussieguy1234 12 hours ago

    I see upvotes, so at least some people agree with this possibility.

    One more reason to stick with open source, auditable solutions. Any backdoor in open source software would be quickly noticed by the community (such as recently when NPM packages got compromised).

NordStreamYacht 1 day ago

Laid off Microsoft researcher?

  • zuzululu 1 day ago

    No way to know but the timing is peculiar....conspiracy?

  • pcthrowaway 1 day ago

    Or laid of NSA, laid off Mossad, or many other possibilities.

    Or not laid off at all, but otherwise disgruntled security researcher who prompted AI to concoct some personal details that seem to be in line with someone inexplicably dropping Microsoft zero-days.

Havoc 1 day ago

Seems odd that someone is both capable of this and homeless. This stuff has decent value on the grey market

  • gilrain 1 day ago

    You imagine people wind up homeless because they can’t do useful things? What a just world!

getcrunk 1 day ago

Anyone remember the Samsung ssd issue with bitlocker from maybe like a decade or so ago where it was an empty encryption key or something