This is an automated archive made by the Lemmit Bot.
The original was posted on /r/pcmasterrace by /u/AmarildoJr on 2026-05-13 19:19:33+00:00.
Chaotic Eclipse, a security researcher, has published a working bypass that only requires a simple USB stick in order to completely bypass Bitlocker's encryption.
This is the same security researcher who, last month, published two working exploits against Windows Defender. Both make it possible to exploit Windows Defender and gain Administrator privileges.
The researcher said on his GitHub repo that it "almost feels like a backdoor".
According to Tom's Hardware:
YellowKey can be triggered simply by merely copying some files to a USB stick and rebooting to the Windows Recovery Environment. We tested this ourselves, and sure enough, not only does it work, it bears all the hallmarks of a backdoor, down to the exploit's files disappearing from the USB stick after it's used once.
The process is dead simple: grab any USB stick, get write access to the "System Volume Information," and copy into it the "FsTx" folder and its contents. Shift+click Restart to get Windows to the recovery environment, but then switch to holding down the Control key and don't let go. The machine will reboot, and without asking any questions or showing any menus, will drop you in an elevated command line with full access to the formerly Bitlocked drive, without asking for any keys.
https://www.tomshardware.com/tech-industry/cyber-security/microsoft-bitlocker-protected-drives-can-now-be-opened-with-just-some-files-on-a-usb-stick-yellowkey-zero-day-exploit-demonstrates-an-apparent-backdoor