Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

German exhibition explores history of fragrance

October 29, 2025

Jim Morrison’s historic ski descent on Mount Everest’s most dangerous run

October 28, 2025

Mormon church women embrace new sleeveless sacred undergarments

October 28, 2025
Facebook X (Twitter) Instagram
Trending
  • German exhibition explores history of fragrance
  • Jim Morrison’s historic ski descent on Mount Everest’s most dangerous run
  • Mormon church women embrace new sleeveless sacred undergarments
  • Ex-thief says he warned Louvre of security weaknesses before jewel heist
  • Gardening can lead to mishaps as scary as any Halloween
  • Cat in the Hat returns in newly discovered Dr. Seuss manuscript
  • Americans love Halloween and won’t quit spooky season: AP-NORC poll
  • Women are breaking into the male-dominated Mexican regional music genre
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Wednesday, October 29
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Fresh Windows NTLM Vulnerability Exploited in Attacks
Cybersecurity

Fresh Windows NTLM Vulnerability Exploited in Attacks

By adminApril 18, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 110


The exploitation of a Windows NTLM vulnerability started roughly a week after patches were released last month, Check Point warns.

Tracked as CVE-2025-24054 (CVSS score of 6.5) and resolved on March 2025 Patch Tuesday, the medium-severity flaw could allow NTLM hash disclosure, enabling attackers to perform spoofing attacks over a network.

According to Microsoft’s advisory, successful exploitation of the bug requires minimal interaction from the user. Simply selecting or right-clicking a malicious file could trigger the security defect.

One week after patches were rolled out for CVE-2025-24054, threat actors started exploiting it in attacks targeting government and private institutions in Poland and Romania, Check Points says.

“This vulnerability is triggered when a user extracts a ZIP archive containing a malicious .library-ms file. This event will trigger Windows Explorer to initiate an SMB authentication request to a remote server and, as a result, it leaks the user’s NTLM hash without any user interaction,” the cybersecurity firm notes.

After exposing the NTLM hash, an attacker could perform brute-force attacks to extract the user’s password, or could mount relay attacks.

Depending on the privileges of the compromised account, the attacker could then move laterally on the network, escalate privileges, and potentially compromise the domain.

While Microsoft does not flag CVE-2025-24054 as exploited in its advisory, between March 19 and March 25, Check Point observed roughly a dozen malicious campaigns targeting it. The extracted NTLM hashes were collected on SMB servers in Australia, Bulgaria, the Netherlands, Russia, and Turkey.

Advertisement. Scroll to continue reading.

“[One] campaign appears to have occurred around March 20–21, 2025. The main targets seem to have been the Polish and Romanian governments and private institutions. The campaign targeted the victims via email phishing links, which include an archive file, downloaded from Dropbox,” Check Point explains.

One of the files inside the archive is associated with CVE-2024-43451, a Windows NTLM hash disclosure bug exploited as a zero-day by Russian threat actors, while another referenced an SMB server associated with the Russian state-sponsored APT Fancy Bear, also known as APT28, Forest Blizzard, and Sofacy.

Check Point also warns that, in at least one campaign observed on March 25, the malicious .library-ms file was distributed unzipped.

On Thursday, the US cybersecurity agency CISA added CVE-2025-24054 to its Known Exploited Vulnerabilities (KEV) list. As mandated by BOD 22-01, federal agencies should patch the flaw by May 8, but CISA urges all organizations to prioritize addressing the bugs in the KEV catalog.

Related: CISA Urges Urgent Patching for Exploited CentreStack, Windows Zero-Days

Related: Microsoft Patches 125 Windows Vulns, Including Exploited CLFS Zero-Day

Related: Newly Patched Windows Zero-Day Exploited for Two Years



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

Billionaire Kwek Leng Beng’s CDL Sells 84% Of Residential Towers Amid Singapore Property Boom

October 27, 2025

Buyers looking at the Zyon Grand sales gallery over the weekend launch.Courtesy of City DevelopmentsCity…

Here’s All The Vineyards, Restaurants And Properties In Which Gavin Newsom Owns Stakes

October 26, 2025

These Are The Billionaires Cutting Checks To Stop Zohran Mamdani

October 24, 2025

These Are The Billionaires Cutting Checks To Stop Zohran Mamdani

October 24, 2025
Our Picks

German exhibition explores history of fragrance

October 29, 2025

Jim Morrison’s historic ski descent on Mount Everest’s most dangerous run

October 28, 2025

Mormon church women embrace new sleeveless sacred undergarments

October 28, 2025

Ex-thief says he warned Louvre of security weaknesses before jewel heist

October 28, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.