Phishing, Vulnerability Management

Phishing campaigns abuse Windows NTLM hash leak bug

binary code and magnifying glass

BleepingComputer reports that government organizations and private firms have been subjected to attacks exploiting the recently patched Windows NTLM hash leak vulnerability, tracked as CVE-2025-24054, as part of separate phishing campaigns between Mar. 20 and Mar. 25, with one of the identified IP addresses associated with Russian state-backed threat operation APT28, also known as Fancy Bear.

Initial intrusions involved targeting Polish and Romanian entities with phishing emails including a Dropbox link redirecting to a .library-ms file-containing ZIP archive, which when extracted set off the flaw to allow an SMB connection to the file-specified URL and the eventual compromise of NTLM hashes, according to Check Point researchers. Further analysis of the archive revealed three other files that abuse older NTLM hash vulnerabilities. Meanwhile, attackers behind a more recent campaign distributed malicious emails with only the .library-ms attachment, which facilitated NTLM authentication to the remote server upon downloading. Organizations have been urged to not only implement Microsoft's March 2025 updates but also deactivate NTLM authentication if unneeded.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds