YellowKey reportedly works in Windows 11, Windows Server 2022 and 2025, but not in Windows 10.

  • Cornballer@lemmy.zip
    link
    fedilink
    English
    arrow-up
    53
    ·
    edit-2
    3 days ago

    Somebody on twitter “reverse engineered” the exploit. Apparently ms shipped debug code in production. At least it’s not called Backdoor_FBI outright.

    How it works:

    1. Recovery tools look for a config file called RecoverySimulation.ini on the OS drive
    2. If Active=Yes, it enables “test mode” for the recovery tools
    3. Test mode unlocks your BitLocker drive but a flag called FailRelock tells it to skip relocking
    4. cmd.exe spawns with full access to your “encrypted” drive
    • BigDanishGuy@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      19
      ·
      3 days ago

      Does test mode unlock without the key?!? So it’s just “encrypted” with a generic key, and the unlock key is for authentication? That sounds insane, even for microsoft.

      • mavu@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        13
        ·
        3 days ago

        this works because the bitlocker key is stored in the TPM of the mainboard on the computer.
        That is neccessary for the computer to be able to boot without entering your bitlocker password. you can configure it differently, but that is not default or super obvious to do.

        • RamRabbit@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          edit-2
          2 days ago

          It always struck me as…poor…to not require a password for decryption. If you require zero knowlege from me, that means a stolen has everything inside needed to decrypt all the data.

          And well, lookie there at the article!

    • jabberwock@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      17
      ·
      3 days ago

      “Ah yes, but think about how much faster they shipped that code with Copilot doing all the heavy lifting.”

      • Some Microsoft exec, probably
  • Reygle@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    2 days ago

    Microslop can’t even claim incompetence. The way this reads, the function is intended as a back door.

  • SleeplessCityLights@programming.dev
    link
    fedilink
    English
    arrow-up
    40
    ·
    3 days ago

    BitLocker is basically malware, so who fucking cares. Far more people have it accidentally on and get locked out than people that have purposefully activated it.

      • SleeplessCityLights@programming.dev
        link
        fedilink
        English
        arrow-up
        8
        ·
        3 days ago

        When I worked at an MSP, BitLocker cost companies thousands of dollars when it did something strange. User error has very catastrophic consequences with BitLocker and nobody that actually cares about security uses BitLocker. From my professional experience it is malware. The places where I have seen it used on purpose was because of policy bullshit and everyone agreed that it was a hindrance rather than an advantage.

        • TheEighthDoctor@lemmy.zip
          link
          fedilink
          English
          arrow-up
          5
          ·
          edit-2
          3 days ago

          And from my experience in banking, healthcare and others; every company uses bitlocker on workstations, I saw EncFS once in dozens of companies audited.

          • SleeplessCityLights@programming.dev
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 days ago

            Using encryption on files systems is fine, but the Microslop Bitlocker implementation is awful. In any ecosystem that is not fully regulated BitLocker is a liability. I have had colleagues that could beat it.

      • freely1333@reddthat.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        3 days ago

        Companies care that you have access to it. The “companies that care” literally wrote the backdoor.

    • Squizzy@lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      ·
      3 days ago

      You have just reminded me I could use this on the laptop my mother set up like five years ago and immediately forgot the password for.

  • Optional@lemmy.world
    link
    fedilink
    English
    arrow-up
    192
    ·
    4 days ago

    YellowKey can be triggered simply by merely copying some files to a USB stick and rebooting to the Windows Recovery Environment. We tested this ourselves, and sure enough, not only does it work, it bears all the hallmarks of a backdoor, down to the exploit’s files disappearing from the USB stick after it’s used once.

    • humanspiral@lemmy.ca
      link
      fedilink
      English
      arrow-up
      42
      ·
      3 days ago

      100% certainty of backdoor. Is bitlocker developed outside of MSFT? Would seem to need MSFT cooperation to implement.

      • humanspiral@lemmy.ca
        link
        fedilink
        English
        arrow-up
        19
        ·
        3 days ago

        Bitlocker was developed entirely inside MSFT. Upon further review, there is a chance that this is all somewhat normal behaviour. Part of MSFT safeOS to make it convenient to recover bitlocker access, and update windows.

        • Leon@pawb.social
          link
          fedilink
          English
          arrow-up
          21
          ·
          3 days ago

          And be able to easily comply with law enforcement requests for decryption.

          Ergo, the encryption is actually worthless.

        • Valmond@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          3
          ·
          3 days ago

          Normal behaviour?

          -“Well it turns out we just said your data was protected, for your, ehrm, satisfaction?”

  • gnufuu@infosec.pub
    link
    fedilink
    English
    arrow-up
    170
    ·
    4 days ago

    From their blog:

    Now regarding YellowKey, lots of you are wondering how does one even find such backdoor ?

    I’ll tell you how, it took me more time trying to get it to work than the amount of sleep I had in two years combined. No AI involved, no help in any shape or form. I could have made some insane cash selling this but no amount of money will stand between me and my determination against Microsoft.

    […]

    I can’t wait when I will be allowed to disclose the full story, I think people will find my crashout very reasonable and it definitely won’t be a good look for Microsoft.

    Looking forward to the full story.

    • Jako302@feddit.org
      link
      fedilink
      English
      arrow-up
      89
      ·
      3 days ago

      I could have made some insane cash selling this but no amount of money will stand between me and my determination against Microsoft.

      There is no better motivator than pure anger and spite.

    • KairuByte@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      5
      ·
      3 days ago

      Ngl I feel like it’s just going to be “I thought it was backed up but it wasn’t and M$ wouldn’t write me a back door”

      Which is fine as a back story, but also a dime a dozen really.

      • fosho@lemmy.ca
        link
        fedilink
        English
        arrow-up
        3
        ·
        3 days ago

        Down voted because you rushed this comment and it’s not really clear what you’re trying to say.

  • Taleya@aussie.zone
    link
    fedilink
    English
    arrow-up
    30
    ·
    edit-2
    3 days ago

    of *course *there’s a back door. You motherfuckers think they’ll TPM secure boot lock file manage SECURTYYYY and not let five eyes waltz in whenever they fucking well please?

  • 9tr6gyp3@lemmy.world
    link
    fedilink
    English
    arrow-up
    52
    ·
    edit-2
    3 days ago

    The process is dead simple: grab any USB stick, get write access to the “System Volume Information,” and copy into it the “FsTx” folder and its contents. Shift+click Restart to get Windows to the recovery environment, but then switch to holding down the Control key and don’t let go. The machine will reboot, and without asking any questions or showing any menus, will drop you in an elevated command line with full access to the formerly Bitlocked drive, without asking for any keys.

    Its dead simple to get write access to System Volume Information

    Not even local admins have access to it. A local admin would have to take ownership of that folder (not recommended), but if a local admin is doing that for this exploit, they can just turn off Bitlocker rather than go through this nonsense.

    I misunderstood the exploit. See replies.

    • AnyOldName3@lemmy.world
      link
      fedilink
      English
      arrow-up
      50
      ·
      edit-2
      4 days ago

      By exploit standards, that’s not especially hard. I don’t think there’s really anything blocking accessing it at all if an NTFS volume is mounted on a typical desktop Linux distro, as it’s just NTFS permissions blocking it, and they’re not typically obeyed by Linux in the first place.

      In the face of your edit, I see that you’ve misunderstood the exploit. You need write access to the System Volume Information directory of your own USB stick, not anything on the target machine. It’s much easier to get access to things on a computer than it is to get access on one particular computer, and this exploit lets you jump from one to the other.

      • 9tr6gyp3@lemmy.world
        link
        fedilink
        English
        arrow-up
        10
        ·
        4 days ago

        Its bitlocker encrypted. You need to unlock the disk to see System Volume Information in Linux.

        • humanspiral@lemmy.ca
          link
          fedilink
          English
          arrow-up
          1
          ·
          3 days ago

          does bitlocker encrypt whole volume, or userdata folders? It’s a performance issue to encrypt anything that doesn’t need to be.

          • 9tr6gyp3@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            edit-2
            3 days ago

            Its whole-volume encryption, not file encryption. Most modern CPUs have built-in AES-NI instructions so its not much of a performance penalty (as long as AES is used for encryption).

        • AnyOldName3@lemmy.world
          link
          fedilink
          English
          arrow-up
          23
          ·
          4 days ago

          I’ll copy the bit here that I just edited into my reply after you edited the first post:

          In the face of your edit, I see that you’ve misunderstood the exploit. You need write access to the System Volume Information directory of your own USB stick, not anything on the target machine. It’s much easier to get access to things on a computer than it is to get access on one particular computer, and this exploit lets you jump from one to the other.

  • Optional@lemmy.world
    link
    fedilink
    English
    arrow-up
    41
    ·
    4 days ago

    You’d think this would only be the 100th-or-so embarrassing security-defying bug to plague micro$oft but you’d be wrong.

    It’s like we’re in a world where most people use windows to log on to facebook. Its bizarre.

    • Snot Flickerman@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      23
      ·
      4 days ago

      Except Microsoft doesn’t have the respectability to discontinue a clearly broken product now that they’ve baked it into ever installaion of Windows 11 by default

    • jqubed@lemmy.world
      link
      fedilink
      English
      arrow-up
      21
      ·
      4 days ago

      As in you think they were pressured into stopping development so people would switch over to BitLocker, which now appears to have a backdoor put in by Microsoft or at least one of the developers, presumably at the behest of a government?

      • ChristerMLB@piefed.social
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 days ago

        The thought did cross my mind, yeah. I don’t think it’s quite sufficient evidence to make such a big conclusion, but both of these seem so conspicuous

      • adarza@lemmy.ca
        link
        fedilink
        English
        arrow-up
        23
        ·
        4 days ago

        there’s a backdoor built right into bitlocker in the form of ‘recovery keys’–and for most users, microsoft knows what they are.

        • mic_check_one_two@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          17
          ·
          3 days ago

          and for most users, microsoft knows what they are.

          This is notable specifically because Microsoft has been compelled by courts to turn over those keys before.

          I don’t blame Microsoft for complying with legal court orders, but I 100% blame them for building systems that allow them to access users’ data (including the keys) in the first place. If they used proper E2EE, they wouldn’t be able to access your keys at all. But that would prevent them from gobbling up all of your private data to sell. And the fifth amendment doesn’t protect third parties. So if the FBI confiscates your PC and you clam up, the feds can just compel Microsoft to give them your keys instead.

  • ExLisper@lemmy.curiana.net
    link
    fedilink
    English
    arrow-up
    7
    ·
    3 days ago

    Why people are saying that the files being deleted indicate a backdoor? This is clearly to be executed while having access to the laptop. So it’s not like I’m tricking someone into connecting the USB drive and after the PC is infected I want to get rid of the evidence. If some FBI agent is using a USB drive to unlock a laptop at work, what’s the point of making the drive single use?

    This could also be part of the PoC created by the researcher, not part of the backdoor.

    • Bazoogle@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      3 days ago

      They said in the article they recreated it on their own. So it couldn’t just be the proof of concept.

      If some FBI agent is using a USB drive to unlock a laptop at work, what’s the point of making the drive single use?

      Under cover/covert operations do actually happen.

      • ExLisper@lemmy.curiana.net
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 days ago

        They said in the article they recreated it on their own. So it couldn’t just be the proof of concept.

        This could mean they just put the files from the exploit on a drive and reproduced it. The author of the exploit claims it’s very complex and no one knows how it works yet.

        Under cover/covert operations do actually happen.

        So what’s the scenario they are protecting themselves against? Someone catching the agent right after they unlocked some encrypted drive with the USB drive still on them? It sounds very far fetched to me that FBI would request a backdroor from Microsoft with this very specific requirement. I think it’s more likely they would cover it on their side with some easily erasable USB drive. Plus such a solution would also let them get rid of the backdoor if they are caught before they used it.

        • Bazoogle@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 days ago

          It’s possible this was just added by the guy for his proof of concept, so I guess we’ll see when more information is released.

          So what’s the scenario they are protecting themselves against?

          I mean, if you had a USB backdoor why wouldn’t you automate the removal of evidence? It would make disposal a lot faster. You can just unplug it and physically destroy it to be safe.

          I think it’s more likely they would cover it on their side with some easily erasable USB drive.

          Why not both? Redundancy never hurt.

          • ExLisper@lemmy.curiana.net
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 days ago

            It’s definitely possible to add a feature like that to a backdoor but I don’t see how that’s a proof it’s a backdoor. It’s definitely not something backdoors always do and we don’t know if this functionality is in Windows or it’s part of the exploit. So am I missing something? Or are people just jumping to conclusions?