Eksploit zero-day lewati enkripsi BitLocker default Windows 11

Sebuah eksploit zero-day yang baru dipublikasikan memungkinkan penyerang dengan akses fisik untuk melewati enkripsi BitLocker pada perangkat Windows 11 hanya dalam hitungan detik. Serangan yang diberi nama YellowKey ini menargetkan konfigurasi default TPM-only dan memberikan akses penuh ke drive terenkripsi melalui metode berbasis USB yang sederhana.

Eksploit ini dirilis awal pekan ini oleh seorang peneliti yang menggunakan alias Nightmare-Eclipse. Eksploit ini bekerja dengan cara menempatkan folder FsTx khusus pada drive USB yang diformat sebagai NTFS atau FAT. Setelah menghubungkan drive tersebut dan memaksa masuk ke Windows Recovery, sistem akan membuka command prompt dengan akses tanpa batas ke konten drive, sehingga melewati persyaratan kunci pemulihan BitLocker yang biasanya diperlukan.

Artikel Terkait

Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
Gambar dihasilkan oleh AI

Linux CopyFail exploit threatens root access amid Ubuntu outage

Dilaporkan oleh AI Gambar dihasilkan oleh AI

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

Daemon Tools, a popular disk image mounting app, was compromised in a supply-chain attack starting April 8, delivering malware through official updates. Security firm Kaspersky reported infections on thousands of machines across over 100 countries. Users are urged to scan their systems immediately.

Dilaporkan oleh AI

New research from ETH Zurich and USI Lugano reveals vulnerabilities in popular password managers, challenging their assurances that servers cannot access user vaults. The study analyzed Bitwarden, Dashlane, and LastPass, identifying ways attackers with server control could steal or modify data, particularly when features like account recovery or sharing are enabled. Companies have begun patching the issues while defending their overall security practices.

The Hacker News has released its latest ThreatsDay Bulletin, focusing on various cybersecurity issues. The bulletin covers topics such as Kali Linux combined with Claude, Chrome crash traps, WinRAR flaws, and activities related to LockBit. It also includes over 15 additional stories on emerging threats.

Dilaporkan oleh AI

Developers of the gacha RPG Duet Night Abyss have apologized for a cybersecurity incident that distributed malware to players' PCs via a launcher update on March 18. The malware, identified as Trojan:MSIL/UmbralStealer.DG!MTB, targets passwords and cryptocurrency. Players receive in-game compensation as the team implements security enhancements.

Situs web ini menggunakan cookie

Kami menggunakan cookie untuk analisis guna meningkatkan situs kami. Baca kebijakan privasi kami untuk informasi lebih lanjut.
Tolak