{"id":338212,"date":"2026-05-21T07:36:27","date_gmt":"2026-05-21T02:06:27","guid":{"rendered":"https:\/\/ebiztoday.news\/?p=338212"},"modified":"2026-05-21T07:36:27","modified_gmt":"2026-05-21T02:06:27","slug":"microsoft-is-working-on-a-patch-for-yellowkey-attack-on-bitlocker-offers-temporary-fix-computerworld","status":"publish","type":"post","link":"https:\/\/ebiztoday.news\/index.php\/2026\/05\/21\/microsoft-is-working-on-a-patch-for-yellowkey-attack-on-bitlocker-offers-temporary-fix-computerworld\/","title":{"rendered":"Microsoft is working on a patch for &#8216;YellowKey&#8217; attack on Bitlocker, offers temporary fix \u2013 Computerworld"},"content":{"rendered":"<div>\n<p>\u201cOrganizations should\u00a0start by auditing their environment for the conditions that exist that leave them vulnerable to YellowKey,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/eric-grenier-29a99742\/\" target=\"_blank\" rel=\"noreferrer noopener\">Eric Grenier<\/a>, senior director analyst at Gartner. \u201cThey must also have a transparent understanding of their risk acceptance within the case of a lost\/stolen device and, based on that acceptance (or non-acceptance), follow the steps\u00a0equivalent to customizing Secure Boot and\u00a0ensuring firmware and Boot integrity.\u201d .<\/p>\n<p>\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/karl-fosaaen\/\" target=\"_blank\" rel=\"noreferrer noopener\">Karl Fosaaen<\/a>, VP of research at cybersecurity company NetSPI, agreed. \u201cSince this vulnerability requires physical access to take advantage of, organizations ought to be specializing in the physical security controls around their Windows devices,\u201d he said. \u201cHaving strong policies and controls around physical access to devices is a very good first step in helping protect the possibly vulnerable devices. If there are additional concerns about attackers with the ability to gain access to files on the system, organizations can take a look at limiting the information that they permit users to store locally.\u201d<\/p>\n<aside class=\"jwPlayer--floatingContainer\" role=\"complementary\" data-nosnippet=\"\">\n<\/aside>\n<p>One among the problems facing corporations is the proliferation of employees using mobile devices, which makes it harder for organizations to limit access to them. \u201cYou\u2019re increasingly seeing corporations with corporate data on their laptops, and YellowKey can leave that data unlocked,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/nathanjohnwebb\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nathan Davies-Webb<\/a>, principal consultant at UK-based security company Acumen. That is where tight device security policies come into play, equivalent to prohibiting users from leaving devices unattended.<\/p>\n<p>Nonetheless, said Fosaaen, what makes detection of an attack particularly difficult for the person user is that it just isn&#8217;t immediately apparent that a tool has been targeted. \u201cIf an attacker used the exploit to read files from the encrypted volume, there likely wouldn\u2019t be any indicators to a user. If the attacker implanted malicious software, you would possibly see increased system utilization, or other performance issues,\u201d he noted.<\/p>\n<\/div>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cOrganizations should\u00a0start by auditing their environment for the conditions that exist that leave them vulnerable to YellowKey,\u201d said Eric Grenier, senior director analyst at Gartner. \u201cThey must also have a transparent understanding of their risk acceptance within the case of a lost\/stolen device and, based on that acceptance (or non-acceptance), follow the steps\u00a0equivalent to customizing [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":338213,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[6727,51755,17165,2305,92,2342,578,13660,2250,51965],"class_list":["post-338212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-attack","tag-bitlocker","tag-computerworld","tag-fix","tag-microsoft","tag-offers","tag-patch","tag-temporary","tag-working","tag-yellowkey"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/posts\/338212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/comments?post=338212"}],"version-history":[{"count":2,"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/posts\/338212\/revisions"}],"predecessor-version":[{"id":338215,"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/posts\/338212\/revisions\/338215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/media\/338213"}],"wp:attachment":[{"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/media?parent=338212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/categories?post=338212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/tags?post=338212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}