David Schwartz, Ripple's former chief technology officer, has flagged a critical security hole in Microsoft's BitLocker encryption that lets attackers bypass full-disk protection using only a USB drive—no password or authentication required. He called it one of the worst flaws he's ever seen. Schwartz also sounded the alarm on a spike in XRPL fraud, warning users to watch for fake airdrops and impersonation accounts.
Separately, Google said its security team intercepted an AI-constructed zero-day exploit targeting an open-source admin tool. The exploit bypassed two-factor authentication and was neutralized before it could be used at scale.
BitLocker bypass: a USB key, no login needed
In a series of posts, Schwartz described how the BitLocker vulnerability works. An attacker with physical access to a locked Windows device can plug in a specially crafted USB drive and break the full-disk encryption without triggering any authentication prompt. He did not name the specific Windows version or patch status, but called it “one of the worst security flaws I've encountered.” The disclosure comes as Microsoft typically addresses such issues through its monthly Patch Tuesday cycle, though no official fix has been confirmed.
XRPL scam surge: fake airdrops and impersonators
Schwartz also warned that XRPL scam activity has risen sharply. Fraudsters are running fake airdrop campaigns and setting up accounts that impersonate legitimate projects or officials. He urged users to verify any communication through official channels and to avoid connecting wallets to unsolicited websites or messages. Once funds are sent or a malicious contract is signed, the loss is irreversible, he noted.
Google catches an AI-made zero-day before deployment
On the same day, Google disclosed that its security researchers had intercepted an exploit built entirely by an AI system. The exploit targeted an open-source administration tool and was designed to bypass two-factor authentication. Google said the threat was detected and neutralized before it could be deployed in the wild. The company did not name the AI model used to generate the exploit but emphasized that defensive AI tools—including Big Sleep and CodeMender—are now being deployed to counter these emerging threats.
Big Sleep, an AI-driven vulnerability hunter, and CodeMender, an automated patch generator, are part of Google's broader effort to stay ahead of AI-generated attacks. The incident highlights a growing arms race: attackers using AI to craft exploits and defenders using AI to find and fix them before they're weaponized.
Microsoft has not yet commented on the BitLocker vulnerability. Schwartz said he reported the issue through appropriate channels but did not provide a timeline for a patch. For now, the advice for Windows users is to keep systems updated and, if possible, limit physical access to devices. On the XRPL side, the best defense remains skepticism: if an airdrop looks too good to be true, it probably is.




