A security researcher, using the alias Chaotic Eclipse, has publicly released proof-of-concept (PoC) code for two previously unknown, or zero-day, vulnerabilities in Microsoft Windows. The exploits, dubbed YellowKey and GreenPlasma, were dropped on social media following a public dispute with the Microsoft Security Response Center (MSRC). This act of non-coordinated disclosure places all Windows users at immediate risk, as there are no official patches available. Reports indicate that other threat actors have already begun incorporating the exploits into active attack campaigns. The incident highlights the volatile nature of vulnerability disclosure and the significant danger posed when the process breaks down.
Details are emerging, but the disclosed vulnerabilities are described as:
CRITICAL: These vulnerabilities are reportedly being actively exploited in the wild.
The researcher's public release of working PoC code has enabled other malicious actors to weaponize the exploits rapidly. Reports suggest that active attacks leveraging YellowKey and GreenPlasma began within 24 hours of the disclosure. This is a classic zero-day scenario where defenders have no patch and must rely on mitigations and detection.
The researcher, Chaotic Eclipse (also known as Nightmare Eclipse), has a history of similar disclosures, including a previous zero-day named "BlueHammer." Their stated motivation is frustration with MSRC's handling of their vulnerability submissions. While their actions may stem from a desire to force a response from Microsoft, the result is a dangerous situation for the entire Windows user base. This behavior blurs the line between security research and malicious activity.
No specific Indicators of Compromise (IPs, domains, hashes) were mentioned in the source articles.
Security teams should immediately begin hunting for signs of exploitation:
ctfmon.exectfmon.exe spawning unusual child processes (e.g., cmd.exe, powershell.exe) or exhibiting anomalous behavior, which could indicate exploitation of GreenPlasma.manage-bde.exe, from an unexpected user context.Since no patch is available, detection and mitigation are key.
ctfmon.exe and on any process attempting to tamper with BitLocker or access raw disk contents.As there are no patches, only temporary compensating controls are available:
Use an EDR with strong behavioral analysis to detect anomalies like ctfmon.exe spawning a shell, which could indicate exploitation of GreenPlasma.
Implement application control policies to prevent unauthorized executables from running, which can block the attacker's payload post-privilege-escalation.
Restrict local administrator rights. The GreenPlasma exploit requires an attacker to already have local code execution, so limiting user privileges reduces the attack surface.
Given that GreenPlasma is an Elevation of Privilege (EoP) flaw in the ctfmon.exe process, the most critical defensive measure is behavioral process analysis via an Endpoint Detection and Response (EDR) solution. Security teams must immediately create and deploy high-priority detection rules that monitor for any anomalous behavior originating from ctfmon.exe. A legitimate ctfmon.exe process should not be spawning child processes like cmd.exe, powershell.exe, or any other executable. A rule to detect ParentProcess: ctfmon.exe -> ChildProcess: * would be a high-fidelity indicator of compromise for this specific zero-day. This moves the defense from a signature-based approach (which doesn't exist yet) to a behavioral one, which is essential for combating unknown threats.
To mitigate the impact of the GreenPlasma EoP, organizations should deploy application control or executable allowlisting using tools like Windows Defender Application Control (WDAC) or AppLocker. An EoP vulnerability is only useful to an attacker if they can run a subsequent payload with the elevated privileges. By creating a policy that only allows known, trusted, and signed executables to run on a system, you can prevent the attacker's malicious payload from executing, even if they successfully exploit the vulnerability to gain SYSTEM-level context. This effectively breaks the attack chain and contains the threat, rendering the privilege escalation useless.
For the YellowKey BitLocker bypass, defenders must focus on detecting tampering with the BitLocker configuration and state. This can be achieved through advanced system file and configuration analysis. Configure File Integrity Monitoring (FIM) and EDR tools to place a high-priority alert on any modifications to BitLocker-related registry keys under HKLM\SOFTWARE\Policies\Microsoft\FVE and HKLM\SYSTEM\CurrentControlSet\Control\BitLocker. Furthermore, use auditpol to enable detailed logging of authentication and policy change events, and monitor the BitLocker-API and BitLocker-DrivePreparationTool event logs for any unexpected suspension, decryption, or recovery key access events. An attacker exploiting YellowKey would have to interact with these components, and robust logging provides the best chance of detecting that interaction.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.