{"id":12869,"date":"2026-05-13T15:37:36","date_gmt":"2026-05-13T15:37:36","guid":{"rendered":"https:\/\/wildgreenquest.com\/?p=12869"},"modified":"2026-05-13T15:37:36","modified_gmt":"2026-05-13T15:37:36","slug":"microsoft-windows-alert-angry-hacker-drops-2-new-zero-day-exploits","status":"publish","type":"post","link":"https:\/\/wildgreenquest.com\/?p=12869","title":{"rendered":"Microsoft Windows Alert\u2014Angry Hacker Drops 2 New Zero-Day Exploits"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div>\n<figure class=\"embed-base image-embed embed-0\" role=\"presentation\">\n<div style=\"padding-top:66.39%;position:relative\" class=\"image-embed__placeholder\"><picture><source media=\"(min-width: 960px)\" sizes=\"50vw\" srcset=\"https:\/\/imageio.forbes.com\/specials-images\/imageserve\/69de4033b07c322f4ee121e7\/Windows-logo-appears-on-the-screen-of-a-smartphone-\/0x0.jpg?width=960&amp;dpr=1 1x, https:\/\/imageio.forbes.com\/specials-images\/imageserve\/69de4033b07c322f4ee121e7\/Windows-logo-appears-on-the-screen-of-a-smartphone-\/0x0.jpg?width=960&amp;dpr=1.5 1.5x, https:\/\/imageio.forbes.com\/specials-images\/imageserve\/69de4033b07c322f4ee121e7\/Windows-logo-appears-on-the-screen-of-a-smartphone-\/0x0.jpg?width=960&amp;dpr=2 2x\"\/><\/picture><\/div>\n<div>\n<div class=\"bMqrj\">\n<p><span style=\"-webkit-line-clamp:2\" class=\"Ccg9Ib-7 _8XF2kHYM\">Angry hacker drops more Windows 0-Days in ongoing campaign.<\/span><\/p>\n<p><small class=\"pGGCM2aD\">NurPhoto via Getty Images<\/small><\/div>\n<\/div>\n<\/figure>\n<p>The day following the Microsoft Patch Tuesday security updates rollout is known in cybersecurity circles as Exploit Wednesday. This month, there is more reason than ever to take that very seriously indeed. While Microsoft didn\u2019t patch any \u201cin the wild\u201d vulnerabilities this time, an angry hacker known by the monikers Chaotic Eclipse and Nightmare Eclipse decided to synchronize the public disclosure of no less than two zero-day exploits with the official release. Here\u2019s what you need to know, and do, about the YellowKey and GreenPlasma exploits.<\/p>\n<p><span class=\"link-embed__info\"><span class=\"link-embed__provider\">Forbes<\/span><span class=\"link-embed__title\">\u2018Significant Threat\u2019\u2014Billions Of Gmail Users At Risk From Google Security Gaffe<\/span><small class=\"link-embed__byline\">By <span class=\"link-embed__author\">Davey Winder<\/span><\/small><\/span><span class=\"link-embed__thumbnail-wrapper\"><span class=\"link-embed__thumbnail allow-inline-style\" style=\"background-image:url(https:\/\/specials-images.forbesimg.com\/imageserve\/68f21e2dac26a6d6ec2437ed\/0x0.jpg)\"\/><\/span><\/p>\n<section id=\"what-you-need-know-about\">\n<h2 class=\"subhead-embed\">What You Need To Know About The YellowKey And GreenPlasma Microsoft Windows Zero-Day Exploits<\/h2>\n<p>Hell hath no fury like a security researcher scorned. Well, that appears to be so in the case of a bug bounty hacker known as Chaotic Eclipse, who has a history when it comes to posting Windows zero-days after being unhappy over communications with the Microsoft Security Response Center. Having publicly released exploit code for a zero-day in April, that went by the name of BlueHammer and turned Microsoft Defender\u2019s own update workflow into a credential theft mechanism, they are now at it again. <\/p>\n<p>\u201cMicrosoft has chosen to make this worse instead of resolving the situation like adults,\u201d Chaotic Eclipse said, \u201cthey pulled every childish game possible. My patience is running out you&#8217;re making everyone else paying for it.\u201d The security researcher on a mission went on to address Microsoft security directly, saying, \u201cI\u2019m not sure what type of reaction you expected from me when you threw more gas on the fire after BlueHammer,\u201d warning that the \u201cfire will go as long as you want, unless you extinguish it or until there nothing left to burn.\u201d<\/p>\n<p>The latest fuel comes in the form of two new zero-day exploits called <a rel=\"nofollow\" class=\"color-link\" href=\"https:\/\/github.com\/Nightmare-Eclipse\/YellowKey\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/github.com\/Nightmare-Eclipse\/YellowKey\" aria-label=\"YellowKey\">YellowKey<\/a> and GreenPlasma. The first is a Windows BitLocker encryption bypass, the second a Windows CTFMON arbitrary section creation elevation of privileges vulnerability. Together, within 24 hours of the public proof of exploit code being published, they have already been <a rel=\"nofollow\" class=\"color-link\" href=\"https:\/\/www.huntress.com\/blog\/nightmare-eclipse-intrusion\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.huntress.com\/blog\/nightmare-eclipse-intrusion\" aria-label=\"used in active attack campaigns\">used in active attack campaigns<\/a>. <\/p>\n<p><span class=\"link-embed__info\"><span class=\"link-embed__provider\">Forbes<\/span><span class=\"link-embed__title\">Critical New Linux Zero-Day Leaked\u2014What Admins Need To Do Now<\/span><small class=\"link-embed__byline\">By <span class=\"link-embed__author\">Davey Winder<\/span><\/small><\/span><span class=\"link-embed__thumbnail-wrapper\"><span class=\"link-embed__thumbnail allow-inline-style\" style=\"background-image:url(https:\/\/specials-images.forbesimg.com\/imageserve\/69fdef6f9730dd6c490647f6\/0x0.jpg)\"\/><\/span><\/p>\n<p>\u201cBoth of the released exploit POCs suggest significant, potentially systemic flaws in how modern Windows operating system features handle path trust (GreenPlasma) and recovery (YellowKey),\u201d Gavin Knapp, cyber threat intelligence principal lead at Bridewell, said. Microsoft is not the only vendor suffering from such issues, as is evident in my exclusive report on architectural failings in security mechanisms designed to protect Google Drive and Gmail users. Historical system vulnerabilities are being found rapidly, Knapp wanted, \u201cwhich is likely due to skilled researchers leveraging AI to expedite and scale vulnerability research and exploit development.\u201d <\/p>\n<p>Organizations should treat this as an active threat, Neena Sharma, a cybersecurity specialist at Filigree, told me, advising them to \u201cassess their exposure immediately, particularly for devices in high-risk physical access scenarios such as field devices, and shared workstations.\u201d Because immediate patching isn\u2019t possible at the time of writing, Sharma suggested implementing \u201ccompensating controls like restricting USB boot access.&#8221;<\/p>\n<p>Meanwhile, Chaotic Eclipse has issued the following warning to the Microsoft Security Response Center: \u201cYour recent actions made me take the difficult decision to drag other companies into this, be prepared to answer questions.<br \/>Next Patch Tuesday will have a big surprise for you, Microsoft. And remember, I never failed to deliver a promise.\u201d<\/p>\n<\/section>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2026\/05\/13\/microsoft-windows-alert-angry-hacker-drops-2-new-zero-day-exploits\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Angry hacker drops more Windows 0-Days in ongoing campaign. NurPhoto via Getty Images The day following the Microsoft Patch Tuesday security updates rollout is known in cybersecurity circles as Exploit Wednesday. This month, there is more reason than ever to take that very seriously indeed. While Microsoft didn\u2019t patch any \u201cin the wild\u201d vulnerabilities this<\/p>\n","protected":false},"author":1,"featured_media":12870,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[],"class_list":{"0":"post-12869","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-brand-spotlights"},"_links":{"self":[{"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=\/wp\/v2\/posts\/12869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12869"}],"version-history":[{"count":0,"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=\/wp\/v2\/posts\/12869\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=\/wp\/v2\/media\/12870"}],"wp:attachment":[{"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wildgreenquest.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}