Microsoft has introduced hardware-accelerated BitLocker encryption in Windows 11, significantly improving storage performance and reducing CPU usage by offloading cryptographic operations to dedicated hardware, especially benefiting random I/O operations and modern multitasking workloads.
Microsoft acknowledges that enabling BitLocker on Windows 11 PCs with NVMe SSDs can cause a performance slowdown, especially during resource-intensive tasks like gaming and video editing, due to increased CPU usage for encryption. However, hardware-accelerated BitLocker, supported by upcoming CPUs and SoCs, offloads encryption tasks to dedicated hardware, significantly reducing CPU load and improving performance and battery life. Users can verify support via command line, and future updates will enable automatic use of hardware acceleration on compatible devices.
Microsoft has confirmed a problematic Windows update released in October 2025 that can trigger the BitLocker recovery screen, risking data loss for users who do not have their recovery keys, especially affecting enterprise Windows 11 and Windows 10 users. A fix is available but requires manual intervention by IT teams.
A new ransomware strain called ShrinkLocker is exploiting Windows BitLocker to encrypt and steal files, primarily targeting government agencies and firms in manufacturing and pharmaceuticals. Unlike typical ransomware, ShrinkLocker does not drop a ransom note but instead uses email addresses as new boot partition labels for communication. It also deletes all BitLocker protectors, making recovery impossible without the attackers' key. The ransomware has affected organizations in Mexico, Indonesia, and Jordan.
A new ransomware called ShrinkLocker uses Windows' BitLocker feature to encrypt victim data, targeting systems in Mexico, Indonesia, and Jordan. Discovered by Kaspersky, ShrinkLocker shrinks non-boot partitions and creates new primary partitions, then disables BitLocker protections and generates a complex encryption key. Kaspersky advises robust endpoint protection, minimal user privileges, and frequent offline backups to mitigate risks.
A new ransomware strain called ShrinkLocker uses Windows BitLocker to encrypt files by creating new boot partitions, targeting government entities and companies in the vaccine and manufacturing sectors. Written in VBScript, ShrinkLocker detects specific Windows versions and modifies registry entries to disable remote desktop connections and enable BitLocker encryption without a TPM. The malware deletes BitLocker protectors to prevent recovery and uses TryCloudflare to deliver encryption keys. Kaspersky advises secure storage of recovery keys and regular offline backups to mitigate such attacks.
A security researcher demonstrated an exploit using a Raspberry Pi Pico and a custom PCB to break Microsoft's BitLocker drive encryption by sniffing the encryption key sent in plaintext from an external TPM chip to the laptop. While this exploit affects systems with discrete TPM chips, modern systems with firmware TPM modules integrated into the processor are not vulnerable. The exploit highlights the importance of understanding the type of TPM used in a system and the potential vulnerabilities associated with different TPM implementations.
Security researcher Stacksmashing demonstrated in a YouTube video that BitLocker encryption in Windows OS can be cracked in just 43 seconds using a $4 Raspberry Pi Pico, due to a design flaw in devices with dedicated TPMs. By directly accessing the hardware and extracting the encryption keys stored in the computer's Trusted Platform Module (TPM) via the LPC bus, threat actors can bypass BitLocker's encryption. This raises concerns about existing encryption methodologies and the need for cybersecurity researchers to identify and fix potential security loopholes.
YouTuber stacksmashing demonstrated how he used a $5 Raspberry Pi Pico to intercept BitLocker encryption keys via the Trusted Platform Module's unencrypted communication lanes, allowing him to decrypt data in 43 seconds. This method requires physical access to the device and an external TPM module, highlighting potential vulnerabilities in BitLocker's security. Microsoft acknowledges these attacks are possible but suggests they require sophisticated tools and long physical access, while newer devices with fTPM and BitLocker PIN configurations may offer more secure alternatives.
YouTuber stacksmashing demonstrated a major security flaw in Bitlocker encryption, using a sub-$10 Raspberry Pi Pico to bypass Windows Bitlocker in 43 seconds and steal the encryption keys. The flaw lies in the unencrypted communication lanes between the CPU and external TPM, allowing an attacker to sniff critical data and access the encryption keys. This flaw affects systems with external TPMs, while CPUs with built-in TPMs are not vulnerable.
A security researcher demonstrated how Bitlocker keys can be stolen in just 43 seconds using inexpensive hardware, highlighting a vulnerability in the widely used Windows encryption system. By exploiting the Trusted Platform Module (TPM) and the LPC bus, the attacker was able to intercept the encryption key from an older Lenovo Thinkpad, showcasing the potential risk of key theft. While modern computers with TPM inside the CPU may require more sophisticated hardware to carry out such an attack, the demonstration underscores the importance of securing encryption keys to prevent unauthorized access to sensitive data.
Windows 10 users are experiencing issues installing the KB5034441 security update, encountering 0x80070643 errors due to a small Windows Recovery Environment (WinRE) partition. Microsoft advises users to manually create a larger WinRE partition to accommodate the update, providing detailed steps involving command line tools. However, there is no guarantee that this solution will resolve the issue, and users are advised to wait for a potential automated solution from Microsoft in the future.
The default software-based BitLocker encryption enabled on pre-built Windows 11 Pro PCs, such as laptops and notebooks, is significantly impacting the performance of SSDs, with the impact reaching up to 45%. OEMs like Dell, HP, and Lenovo confirmed that they ship systems with software-based encryption unless a user orders an SSD with hardware-based encryption. The performance hit is particularly noticeable in random reads and writes, with a 46% slowdown in random writes compared to hardware encryption and a 43% slowdown compared to no encryption. Users can check if BitLocker is enabled by running a command prompt or checking the Disk Management console.
Upgrading from Windows 11 Home to Pro can be beneficial for power users, as it unlocks additional features such as BitLocker, Hyper-V, and more RAM support. The upgrade can be purchased via a code or through the Microsoft Store app. Windows 11 Pro also allows for tighter control over the operating system and the ability to serve as a host for remote access.
Microsoft has released PowerShell scripts to fix a BitLocker security bypass vulnerability in the Windows Recovery Environment (WinRE) for Windows 10 and 11 systems. The vulnerability could allow access to encrypted data in storage devices. The scripts enable enterprises to automatically update WinRE images to protect Windows devices. The flaw can only be exploited on systems with the winre.wim on the recovery partition.