10 Critical Facts About the YellowKey Zero-Day Exploit That Bypasses Windows 11 BitLocker
The YellowKey zero-day exploit bypasses default Windows 11 BitLocker using a custom FsTx folder and physical access. Learn 10 essential facts, mitigations, and why TPM-only encryption is vulnerable.
Imagine a hacker sitting down at your laptop, plugging in a USB drive, and within moments unlocking your entire encrypted hard drive. That’s exactly what a new zero-day exploit called YellowKey does — and it works against the default BitLocker setup in Windows 11. Here’s everything you need to know, broken down into ten essential facts.
1. What Is the YellowKey Zero-Day Exploit?
YellowKey is a malicious technique published by a researcher using the alias Nightmare_Eclipse. It allows anyone with physical access to a Windows 11 machine to completely bypass the default BitLocker encryption in under a minute. The exploit does not require advanced hacking skills; a custom folder and a USB drive are enough. It takes advantage of a rarely documented feature of the Windows filesystem — the FsTx folder — to trick the operating system into ignoring the encryption altogether.

2. How YellowKey Defeats Default BitLocker Protections
BitLocker is Microsoft’s full-volume encryption tool. By default on Windows 11, it protects data using the Trusted Platform Module (TPM) — a hardware chip that stores the decryption key. The TPM automatically unlocks the drive during boot, as long as the system firmware hasn’t been tampered with. YellowKey exploits a flaw in this default configuration: because no PIN or password is required, an attacker can insert a specially crafted USB drive immediately after boot. The exploit creates a custom FsTx folder that manipulates the Transactional NTFS feature, forcing Windows to decrypt the volume without actually validating the user’s identity.
3. The Core Mechanism: The Custom FsTx Folder
The heart of YellowKey is a directory called FsTx placed on a removable drive. Documentation for this folder is sparse, but it appears to interact with Microsoft’s Transactional NTFS (TxF) — a system that allows developers to perform multiple file operations as a single, atomic transaction. The exploit forces the BitLocker driver to process the transaction in a way that effectively unlocks the drive. Think of it as tricking the security guard (TPM) into thinking the door was already opened by an authorized person.
4. Physical Access Is the Only Requirement
YellowKey does not require any network access, passwords, or special privileges. The attacker simply needs physical access to the computer for a few seconds. They plug in a USB drive (or insert a specially prepared disk) immediately after the system starts but before Windows fully loads. Because the default BitLocker configuration relies solely on the TPM and doesn’t enforce a pre-boot PIN, there is no barrier. This makes the exploit especially dangerous for laptops left unattended in public places, offices, or even hotel rooms.
5. Why Default BitLocker Configurations Are Vulnerable
Microsoft offers BitLocker with several layers of protection: TPM alone, TPM + PIN, TPM + startup key, or a combination. The default setting in Windows 11 — and many enterprise deployments — is TPM-only. This was designed for user convenience: no extra login step before Windows boots. However, YellowKey demonstrates that this convenience comes at a cost. Security experts have long warned that TPM-only BitLocker is vulnerable to physical attacks, and this exploit proves it. The attacker doesn’t need to break the TPM; they simply circumvent the necessity for it to validate.
6. Who Is at Risk? (Organizations and Individuals)
Any Windows 11 system with default BitLocker settings is vulnerable. This includes many enterprise laptops, government contractor devices, and even personal computers where the user accepted the default encryption setup. Organizations that mandate BitLocker for compliance but do not enforce a PIN or startup key are especially exposed. Nightmare_Eclipse specifically targeted the default deployment, meaning thousands of devices in government and corporate environments could be compromised. Mobile workers — salespeople, consultants, journalists — are prime targets because their devices often leave secure premises.
7. The Researcher Behind the Exploit: Nightmare_Eclipse
The exploit was published by a researcher known only as Nightmare_Eclipse (as introduced above). While identities are kept anonymous for safety reasons, the detailed write-up demonstrates deep knowledge of Windows internals, specifically NTFS transactional features. The researcher claims to have discovered the vulnerability independently and decided to go public after responsible disclosure timelines were not met. The release includes a proof-of-concept tool that could allow even novice attackers to reproduce the attack, raising serious concerns about widespread exploitation.

8. How to Protect Yourself: Mitigations Against YellowKey
Immediate steps include changing your BitLocker policy from TPM-only to TPM + PIN or TPM + startup key. This forces the attacker to also know a PIN or possess a physical key file. Group Policy editors in Windows Pro and Enterprise allow administrators to enforce this. Additionally, ensure firmware and BIOS are password-protected to prevent boot-device manipulation. Physical security — locking laptops, using Kensington locks — remains critical. Microsoft is expected to issue a security advisory, but until then, manual configuration is the best defense (see item 5 for why defaults are vulnerable).
9. Implications for Enterprise and Government Security
YellowKey exposes a fundamental weakness in trusting TPM-only encryption as a complete security solution. Enterprises that rely on BitLocker for regulatory compliance (e.g., HIPAA, GDPR, FedRAMP) must now reconsider their encryption policies. The exploit could lead to data breaches in high-stakes environments like legal firms, healthcare, and defense. It also raises questions about Microsoft’s testing practices — if a decade-old feature (TxF) can be weaponized this easily, other silent vulnerabilities may exist. The incident underscores the need for layered security measures beyond encryption.
10. Microsoft’s Response (or Lack Thereof)
At the time of writing, Microsoft has not issued an official statement or security patch for YellowKey. Given that the exploit targets default behavior (TPM-only unlock), the company may argue it is by design — but many users feel misled. Security researchers have called for Microsoft to change the BitLocker defaults to require a PIN, at least for new installations. Meanwhile, system administrators are left to manually harden configurations. The incident highlights a growing tension between user convenience and security. Expect updates in future Windows patches, but for now, the burden falls on IT teams.
Conclusion: YellowKey is a stark reminder that even strong encryption can be undone by configuration laziness. While the exploit is clever, it doesn’t break BitLocker itself — it bypasses the default setup that trades security for speed. By understanding these ten facts, you can take proactive steps to lock down your Windows 11 devices before an attacker does. Stay updated, change your BitLocker PIN, and always question default settings.