Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » CVE-2025-24054 with active attack-the NTLM credentials when downloading the file
Global Security

CVE-2025-24054 with active attack-the NTLM credentials when downloading the file

AdminBy AdminApril 18, 2025No Comments3 Mins Read
NTLM Credentials
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 18, 2025Red LakshmananSecurity / vulnerability Windows

NTLM credentials

Cybersecurity and US Infrastructure Agency (CISA) on Thursday on Thursday added Lack of high school security that affects Microsoft Windows to known exploited vulnerabilities (Ship) Catalog, subsequent reports of active exploitation in the wild.

Vulnerability assigned to CVE ID Cve-2025-24054 (CVSS assessment: 6.5), this is a new Windows Local Network Manager (Ntlm) The hash -spinning fake bug that Microsoft was secured last month as part of the patch upgrade on Tuesday.

Cybersecurity

NTLM is a hereditary authentication protocol that Microsoft is officially outdated last year in favor of Kerberos. In recent years, the threats have found different technology operations such as passing and relay attacks, for ntlm hash for subsequent attacks.

“Microsoft Windows NTLM contains external file control or the vulnerability of the path that allows an unauthorized attacker to perform fake on the network,” Cisa said.

In a newsletter published in March, Microsoft said vulnerability could be caused by minimal interaction with a specially designed .library-MS fileFor example, “choice (click), check (right -click) or execution of action other than opening or executing the file”.

The technical giant also attributed to Rintaro Koike with NTT Security Holdings, 0x6RSS and J00SAN to detect and defect.

While Microsoft has given the CVE-2025-24054 assessment of the operation of the “less likely operation”, the lack of safety has since been actively exploited since March 19 for the point, allowing poor subjects to trace Hohhohhes NTLM or user passwords.

“About 20-21 March 2025, a company aimed at government and private institutions in Poland and Romania,” cybersecurity campaign – Note. “The attackers used Malspam to distribute the DropBox link containing an archive that exploits several known vulnerabilities, including CVE-2025-24054, to collect the NTLMV2-SSP.

The disadvantage is rated as an option Cve-2024-43451 (CVSS Assessment: 6.5), which was secured by Microsoft in November 2024, and was armed in the wild in the attacks directed UAC-0194 and Room.

According to Check Point, the file is distributed using the ZIP archives, resulting in Windows Explorer initiated an SMB authentication for a remote server and a NTLM user’s hasha without users interacting, just when downloading and extracting the archive content.

Cybersecurity

Given this, another phishing campaign was found recently, as March 25, 2025, was found to deliver a file called “Info.doc.library- MS” without compression. From the first wave of attacks, at least 10 companies were observed to obtain Hoshes from the NTLM target.

“These attacks used malicious files. Library-MS to collect NTLMV2 hash and escalation of the risk of lateral motion and escalation of privileges within disturbed networks,” the Check Point said.

“This quick exploitation emphasizes the critical need for organizations to immediately apply patches and ensure that NTLM’s vulnerabilities will be resolved in their conditions. The minimum interaction of users needed to operate to launch and ease with which the attackers can access the NTLM hashels, make it a significant threat, especially if you are used. The pass pass.

Federal Civil Executive Agency (FCEB) agencies must apply the necessary corrections for the shortage by May 8, 2025 to provide their networks in light of active operation.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.