Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

How to reduce financial stress during the holiday season

December 13, 2025

The Indigenous women behind Mexican President Claudia Sheinbaum’s ‘most stylish’ looks

December 12, 2025

Online rise of Eastern Orthodoxy tests its clergy

December 12, 2025
Facebook X (Twitter) Instagram
Trending
  • How to reduce financial stress during the holiday season
  • The Indigenous women behind Mexican President Claudia Sheinbaum’s ‘most stylish’ looks
  • Online rise of Eastern Orthodoxy tests its clergy
  • Hanukkah is Judaism’s ‘festival of lights’
  • Skydiver dangles at 15,000 feet after parachute tangles on plane’s tail
  • Buenos Aires dance hall guarantees tango sessions with pro partners
  • MacKenzie Scott’s Latest Gifts Make Her America’s Third Most Generous Philanthropist
  • UNESCO gives a shout-out to Switzerland’s yodeling by adding it to list of cultural heritage
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Saturday, December 13
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Fresh Windows NTLM Vulnerability Exploited in Attacks
Cybersecurity

Fresh Windows NTLM Vulnerability Exploited in Attacks

By adminApril 18, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 135


The exploitation of a Windows NTLM vulnerability started roughly a week after patches were released last month, Check Point warns.

Tracked as CVE-2025-24054 (CVSS score of 6.5) and resolved on March 2025 Patch Tuesday, the medium-severity flaw could allow NTLM hash disclosure, enabling attackers to perform spoofing attacks over a network.

According to Microsoft’s advisory, successful exploitation of the bug requires minimal interaction from the user. Simply selecting or right-clicking a malicious file could trigger the security defect.

One week after patches were rolled out for CVE-2025-24054, threat actors started exploiting it in attacks targeting government and private institutions in Poland and Romania, Check Points says.

“This vulnerability is triggered when a user extracts a ZIP archive containing a malicious .library-ms file. This event will trigger Windows Explorer to initiate an SMB authentication request to a remote server and, as a result, it leaks the user’s NTLM hash without any user interaction,” the cybersecurity firm notes.

After exposing the NTLM hash, an attacker could perform brute-force attacks to extract the user’s password, or could mount relay attacks.

Depending on the privileges of the compromised account, the attacker could then move laterally on the network, escalate privileges, and potentially compromise the domain.

While Microsoft does not flag CVE-2025-24054 as exploited in its advisory, between March 19 and March 25, Check Point observed roughly a dozen malicious campaigns targeting it. The extracted NTLM hashes were collected on SMB servers in Australia, Bulgaria, the Netherlands, Russia, and Turkey.

Advertisement. Scroll to continue reading.

“[One] campaign appears to have occurred around March 20–21, 2025. The main targets seem to have been the Polish and Romanian governments and private institutions. The campaign targeted the victims via email phishing links, which include an archive file, downloaded from Dropbox,” Check Point explains.

One of the files inside the archive is associated with CVE-2024-43451, a Windows NTLM hash disclosure bug exploited as a zero-day by Russian threat actors, while another referenced an SMB server associated with the Russian state-sponsored APT Fancy Bear, also known as APT28, Forest Blizzard, and Sofacy.

Check Point also warns that, in at least one campaign observed on March 25, the malicious .library-ms file was distributed unzipped.

On Thursday, the US cybersecurity agency CISA added CVE-2025-24054 to its Known Exploited Vulnerabilities (KEV) list. As mandated by BOD 22-01, federal agencies should patch the flaw by May 8, but CISA urges all organizations to prioritize addressing the bugs in the KEV catalog.

Related: CISA Urges Urgent Patching for Exploited CentreStack, Windows Zero-Days

Related: Microsoft Patches 125 Windows Vulns, Including Exploited CLFS Zero-Day

Related: Newly Patched Windows Zero-Day Exploited for Two Years



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

MacKenzie Scott’s Latest Gifts Make Her America’s Third Most Generous Philanthropist

December 11, 2025

Photo by JORG CARSTENSEN/dpa/AFP via Getty ImagesOn Tuesday, billionaire philanthropist MacKenzie Scott published her yearly…

Indonesian Billionaires Cash In On Gold Surge

December 10, 2025

Kalshi’s Cofounder Is Now World’s Youngest Self-Made Woman Billionaire

December 2, 2025

Billionaire Kwek Leng Beng’s CDL Expands In London With $370 Million Holiday Inn Deal

December 2, 2025
Our Picks

How to reduce financial stress during the holiday season

December 13, 2025

The Indigenous women behind Mexican President Claudia Sheinbaum’s ‘most stylish’ looks

December 12, 2025

Online rise of Eastern Orthodoxy tests its clergy

December 12, 2025

Hanukkah is Judaism’s ‘festival of lights’

December 12, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.