Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploit NTLM Authentication Flaws to Target Windows Systems

Posted on November 26, 2025November 26, 2025 By CWS

Greater than 20 years after its preliminary discovery, the NTLM authentication protocol continues to plague Home windows methods worldwide.

What began in 2001 as a theoretical vulnerability has advanced right into a widespread safety disaster, with attackers actively weaponizing a number of NTLM flaws to compromise networks throughout totally different areas.

The New Know-how LAN Supervisor (NTLM) protocol was designed to authenticate shoppers and servers in Home windows environments utilizing a three-step handshake.

Though Microsoft has introduced plans to retire NTLM solely, starting with Home windows 11 24H2 and Home windows Server 2025, the protocol stays embedded in thousands and thousands of methods.

This persistence creates an open window for cybercriminals who proceed to find and exploit new vulnerabilities in NTLM’s outdated mechanisms.

A number of Assault Vectors Below Energetic Exploitation

NTLM flaws allow a number of harmful assault methods. Hash leakage happens when attackers craft malicious recordsdata that trick Home windows into sending authentication hashes with out requiring person interplay.

CVE IDSeverityAffected SystemsImpactKnown CampaignsCVE-2024-43451HighWindows (A number of Variations)Hash Leakage, Credential CompromiseBlindEagle (Remcos RAT), Head MareCVE-2025-24054/CVE-2025-24071HighWindows 11, Home windows ServerHash Leakage, Unauthorized AccessTrojan Distribution in Russia (AveMaria/Warzone)CVE-2025-33073HighWindows (SMB Shopper)Privilege Escalation to SYSTEM LevelUzbekistan Monetary Sector Assault

Coercion-based assaults drive methods to authenticate to attacker-controlled companies.

As soon as credentials are compromised, attackers use credential-forwarding methods comparable to Cross-the-Hash to maneuver laterally throughout networks and escalate privileges with out understanding the precise passwords.

Man-in-the-middle assaults stay significantly efficient, with NTLM relay remaining probably the most impactful methodology for 20 years. Attackers place themselves between shoppers and servers to intercept authentication visitors and seize credentials.

Safety researchers have recognized a number of essential NTLM vulnerabilities which can be at present being actively exploited in 2024 and 2025.

CVE-2024-43451 permits NTLMv2 hash leakage via malicious .url recordsdata. Merely interacting with these recordsdata clicking, right-clicking, or transferring them routinely connects to attacker servers operating WebDAV.

The BlindEagle APT group exploited this vulnerability to distribute the Remcos RAT to Colombian targets. On the similar time, the Head Mare hacktivists exploited it in opposition to Russian and Belarusian organizations.

CVE-2025-24054 and CVE-2025-24071 goal .library-ms recordsdata inside ZIP archives, inflicting computerized NTLM authentication to attacker-controlled servers. Researchers detected campaigns in Russia distributing the AveMaria Trojan utilizing this methodology.

CVE-2025-33073 represents a hazardous reflection assault. Attackers manipulate DNS information to trick Home windows into treating exterior authentication requests as native, bypassing common safety checks and granting SYSTEM-level privileges.

In keeping with SecureList, suspicious exercise exploiting this vulnerability was detected in Uzbekistan’s monetary sector.

Regardless of Microsoft addressing these vulnerabilities via patches, the legacy protocol’s continued presence in enterprise networks means assaults will persist.

Organizations sustaining NTLM for compatibility with older purposes stay significantly susceptible. Safety groups ought to prioritize migrating to Kerberos, implementing community segmentation, and monitoring for suspicious authentication makes an attempt throughout their Home windows infrastructure.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Authentication, Exploit, Flaws, Hackers, NTLM, Systems, Target, Windows

Post navigation

Previous Post: Cybersecurity Is Now a Core Business Discipline
Next Post: Thousands of Secrets Leaked on Code Formatting Platforms

Related Posts

1.2 Million Healthcare Devices and Systems Data Leaked Online Cyber Security News
DuckDuckGo Rolls Out New Scam Blocker to Protect Users from Online Threats Cyber Security News
Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs Cyber Security News
Hackers Attacking Remote Desktop Protocol Services from 100,000+ IP Addresses Cyber Security News
North Korean Hackers Stealthy Linux Malware Leaked Online Cyber Security News
Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Free WormGPT Variant Leveraging DeepSeek, Gemini, and Kimi-K2 AI Models
  • OpenAI User Data Exposed in Mixpanel Hack
  • Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps
  • Angular HTTP Client Vulnerability Exposes XSRF Token to an Attacker-Controlled Domain
  • AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Free WormGPT Variant Leveraging DeepSeek, Gemini, and Kimi-K2 AI Models
  • OpenAI User Data Exposed in Mixpanel Hack
  • Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps
  • Angular HTTP Client Vulnerability Exposes XSRF Token to an Attacker-Controlled Domain
  • AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark