By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Windows NTLM hash leak flaw exploited in phishing attacks on governments
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Windows NTLM hash leak flaw exploited in phishing attacks on governments
Tech News

Windows NTLM hash leak flaw exploited in phishing attacks on governments

By admin 4 Min Read
Share
SHARE

A Windows vulnerability that exposes NTLM hashes using .library-ms files is now actively exploited by hackers in phishing campaigns targeting government entities and private companies.

The flaw tracked as CVE-2025-24054 was fixed in Microsoft’s March 2025 Patch Tuesday. Initially, it was not marked as actively exploited and was assessed as ‘less likely’ to be.

However, Check Point researchers report having observed active exploitation activity for CVE-2025-24054 only a few days after patches became available, culminating between March 20 and 25, 2025.

Although one IP address behind these attacks was previously linked to the Russia state-sponsored threat group APT28 (‘Fancy Bear’), it is not enough evidence for confident attribution.

Exposing NTLM hashes

NTLM (New Technology LAN Manager) is a Microsoft authentication protocol that uses challenge-response negotiation involving hashes instead of transmitting plaintext passwords to authenticate users.

While NTLM avoids transmitting plaintext passwords, it is no longer considered secure due to vulnerabilities like replay attacks and brute-force cracking of captured hashes.

Due to this, Microsoft has begun phasing out NTLM authentication in favor of Kerberos or Negotiate.

In attacks seen by Check Point, phishing emails were sent to entities in Poland and Romania that included a Dropbox link to a ZIP archive, containing a .library-ms file.

Unzipped exploit file
<strong>Phishing email attaching the exploit file (unzipped)</strong><br /><em>Source: Check Point</em>

A library-ms file is a legitimate file type that, when opened, shows a Windows library, or virtual container, that contains files and folders from different configured sources. 

In this phishing attack, the library-ms file was created to contain a path to a remote SMB server under the attacker’s control.

Malicious .library-ms file
<strong>Malicious .library-ms file</strong><br /><em>Source: Check Point</em>

When extracting a ZIP file that contains a .library-ms file, Windows Explorer will interact with it automatically, triggering the CVE-2025-24054 flaw and causing Windows to make an SMB connection to the URL specified in the file.

When Windows connects to the remote SMB server, it will attempt to authenticate via NTLM, allowing the attacker to capture the user’s NTLM hashes.

In a later campaign, Check Point discovered phishing emails that contained .library-ms attachments, without an archive. Simply downloading the .library-ms file was enough to trigger NTLM authentication to the remote server, demonstrating that archives were not required to exploit the flaw.

“On March 25, 2025, Check Point Research discovered a campaign targeting companies around the world, distributing these files without being zipped,” explains Check Point.

“According to Microsoft, this exploit is triggered with minimal user interaction with a malicious file, such as selecting (single-clicking), inspecting (right-clicking), or performing any action other than opening or executing the file.”

The malicious archive also contains three more files, namely ‘xd.url,’ ‘xd.website,’ and ‘xd.link,’ which leverage older NTLM hash leak flaws and are most likely included for redundancy in case the ‘library-ms’ method fails.

Check Point says the attacker-controlled SMB servers in this campaign were using the 159.196.128[.]120 and 194.127.179[.]157 IP addresses.

Capturing NTLM hashes could open the way to authentication bypass and privilege escalation, so even though CVE-2025-24054 is only evaluated as a “medium” severity issue, its potential consequences are grave.

Given the low interaction required to exploit, organizations should treat this as a high-risk issue. It is advised that all organizations should install the March 2025 updates and turn off NTLM authentication if it is not required.

You Might Also Like

Can AI Solve Homelessness in Ireland?

How Anthropic’s Ralph Plugin Makes Claude Complete Coding Tasks

Best Streaming Service of the Year: Tech Advisor Awards 2025-26

Factor Meal Delivery Promo: Free $200 Withings Body-Scan Scale

IBM warns of critical API Connect auth bypass vulnerability

TAGGED: Actively Exploited, Information Disclosure, NTLM, Password Hash, Vulnerability, Windows
Share This Article
Facebook Twitter Copy Link
Previous Article The Giants have three private workouts with QBs as the 2025 draft starts next Thursday
Next Article Google Is Once Again Deemed a Monopoly, This Time in Ad Tech
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Sony's patent for PS5 AI tutorial 'ghosts' sound like a nightmare
Gaming News
David Beckham–backed Prenetics abandons Bitcoin strategy to focus on core health business
Crypto
Who Was Isiah Whitlock Jr.? 5 Things to Know About ‘The Wire’ Alum Who Died
Celebrity
Here’s Why The Cardano Network And ADA Could Be A Dominant Force In 2026
Crypto
Can AI Solve Homelessness in Ireland?
Tech News
Starbucks CEO Brian Niccol says a Reddit thread about people interviewing at the company convinced him his ‘Back to Starbucks’ plan is working
Business
How Anthropic’s Ralph Plugin Makes Claude Complete Coding Tasks
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Sony's patent for PS5 AI tutorial 'ghosts' sound like a nightmare

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Sony's patent for PS5 AI tutorial 'ghosts' sound like a nightmare
December 31, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?