Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks

Posted on October 24, 2025October 24, 2025 By CWS

Microsoft this week introduced that the preview characteristic is now disabled in Home windows’s File Explorer for recordsdata downloaded from the web, as a further safety towards NTLM hash leaks.

The change, rolled out as a part of the October 2025 Patch Tuesday safety updates, applies to all recordsdata which might be marked with Mark of the Net (MotW).

Home windows provides the MotW to recordsdata fetched through browser downloads or e mail attachments and warns customers of the potential danger these recordsdata pose. For Workplace recordsdata, the system blocks macros, which might comprise malicious code.

By disabling the preview of recordsdata downloaded from the web, Microsoft seeks to forestall a safety defect resulting in NTLM hash leaks when a doubtlessly unsafe file is previewed. Attackers can brute-force the leaked hash to retrieve a person’s password, or might mount relay assaults.

“This transformation mitigates a vulnerability the place NTLM hash leakage would possibly happen if customers preview recordsdata containing HTML tags (akin to , , and so forth) referencing exterior paths. Attackers might exploit this preview characteristic to seize delicate credentials,” Microsoft explains.

The corporate doesn’t say which flaw it tackles, however it seems that it may very well be CVE-2025-59214, which is described as a File Explorer spoofing subject and will enable attackers to leak delicate data over the community.

The bug is a bypass for CVE-2025-50154, which in flip is a bypass for CVE-2025-24054, a zero-click NTLM credential leakage vulnerability that Microsoft tried to resolve in March. CVE-2025-24054 has been exploited within the wild, together with towards authorities and personal establishments in Poland and Romania.

The unique bug may very well be triggered through malicious .library-ms recordsdata positioned inside a ZIP archive. When the person extracted the archive, Home windows initiated an SMB authentication request to a distant server, leaking the NTLM hash.Commercial. Scroll to proceed studying.

Microsoft warned in March that merely choosing the malicious file or right-clicking it might set off the vulnerability.

Whereas analyzing the problem, Cymulate found the patch may very well be bypassed, and Microsoft in August rolled out a recent spherical of fixes, assigning CVE-2025-50154 to the problem and saying that it existed due to a niche left by the unique patch.

Shortly after, Cymulate discovered that these patches may very well be bypassed as effectively, and reported the weak spot to Microsoft, which assigned CVE-2025-59214 to it.

Now, Microsoft says that disabling File Explorer’s preview characteristic for recordsdata downloaded from the web ought to stop the leak of NTLM hashes.

Following the October safety patches, the File Explorer preview pane will warn customers that the file they’re trying to preview may very well be dangerous and that they need to solely open it in the event that they belief its origin. The identical applies to recordsdata seen on an Web Zone file share.

To take away the block, customers must right-click on the downloaded file, choose Properties, after which Unblock. In accordance with Microsoft, the change might not take impact till the following login.

Associated: ‘Highest Ever’ Severity Rating Assigned by Microsoft to ASP.NET Core Vulnerability

Associated: Patch Bypassed for Supermicro Vulnerability Permitting BMC Hack

Associated: Crucial Vulnerabilities Patched in TP-Hyperlink’s Omada Gateways

Associated: ICS Patch Tuesday: Fixes Introduced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact

Security Week News Tags:Block, Disables, Downloaded, File, Hash, Leaks, Microsoft, NTLM, Previews

Post navigation

Previous Post: Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters
Next Post: 3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation

Related Posts

Controversial Firms Cellebrite and Corellium Announce $200 Million Acquisition Deal Security Week News
Wytec Expects Significant Financial Loss Following Website Hack Security Week News
AI Takes Center Stage at DataTribe’s Cyber Innovation Day Security Week News
Mitel Patches Critical Flaw in Enterprise Communication Platform Security Week News
Workday Data Breach Bears Signs of Widespread Salesforce Hack Security Week News
35,000 Solar Power Systems Exposed to Internet Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks
  • Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
  • Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave
  • New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer
  • SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks
  • Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
  • Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave
  • New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer
  • SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News