利用CVE-2025-24054漏洞进行NTLM哈希泄露攻击
Windows系统中存在关键漏洞CVE-2025-24054,被网络犯罪分子利用通过欺骗技术泄露NTLM哈希,可能导致权限提升和网络横向移动。微软已发布补丁修复该漏洞,但攻击者迅速开始利用此漏洞进行攻击,主要针对政府和私人机构。 2025-4-16 14:24:22 Author: cybersecuritynews.com(查看原文) 阅读量:13 收藏

Hackers Exploiting NTLM Spoofing Vulnerability

Cybercriminals have been actively exploiting a critical vulnerability in Windows systems, identified as CVE-2025-24054. This vulnerability leverages NTLM hash disclosure through spoofing techniques.

This vulnerability, related to NTLM (New Technology LAN Manager) authentication protocols, has become a significant threat, enabling attackers to leak NTLM hashes and potentially escalate privileges or move laterally within compromised networks.

NTLM is a suite of authentication protocols developed by Microsoft to verify user identities and secure network communications. While NTLMv2 offers improved security over earlier versions, vulnerabilities still exist, especially when attackers can manipulate how hashes are transmitted or disclosed.

Google News

CVE-2025-24054 specifically involves the external control of file names or paths in Windows, allowing malicious actors to trigger SMB (Server Message Block) authentication requests that leak NTLMv2-SSP hashes during routine file operations.

Microsoft released a security patch for CVE-2025-24054 on March 11, 2025. The flaw is triggered when a user extracts a ZIP archive containing a malicious .library-ms file, which causes Windows Explorer to initiate an SMB authentication request to a remote server.

This process inadvertently leaks the user’s NTLM hash, which attackers can then capture for further malicious activities. Notably, the exploit can be triggered with minimal user interaction, such as right-clicking, dragging, dropping, or simply navigating to a folder containing the malicious file.

Active Exploitation of Vulnerability in the Wild

Despite the patch, threat actors began exploiting CVE-2025-24054 within days of its release. Check Point Research first observed malicious campaigns leveraging this flaw around March 20–21, 2025.

These campaigns targeted government and private institutions, primarily in Poland and Romania, using spear-phishing emails containing ZIP archives and embedded malicious files.

Check Point told Cyber Security News that once victims downloaded and interacted with these files, such as unzipping or clicking them, the exploit was triggered, leading to the leak of NTLM hashes.

The malicious archives contained files, including .library-ms, .url, .website, and .lnk files, all designed to initiate SMB connections to attacker-controlled servers. These connections exposed NTLMv2-SSP hashes, which attackers could then use to perform pass-the-hash attacks, relay attacks, or escalate privileges within the network.

Hackers Exploiting NTLM Spoofing Vulnerability
NTLMv2-SSP Hash

The campaigns appeared highly targeted, with the primary goal of harvesting NTLM hashes for subsequent use in lateral movement or privilege escalation.

The collected hashes were sent to malicious SMB servers hosted in various countries, including Russia, Bulgaria, the Netherlands, Australia, and Turkey. The use of such techniques underscores the sophistication of the threat actors, believed to be linked to state-sponsored groups with advanced capabilities.

One notable campaign involved distributing malicious files via email links from Dropbox, which, when interacted with, exploited the vulnerability to leak hashes.

The campaign’s focus on government agencies in Poland and Romania highlights the geopolitical significance and potential for espionage or sabotage.

The exploit hinges on Windows Explorer’s handling of ZIP archives containing malicious files. When a user extracts such an archive, Windows initiates SMB authentication requests to remote servers specified within the malicious files.

These requests leak NTLMv2-SSP hashes without requiring extensive user interaction, making the attack particularly insidious. Attackers can then use these hashes to authenticate as legitimate users, often with high privileges, enabling lateral movement and network compromise.

Mitigations

Microsoft’s prompt patching of CVE-2025-24054 was a crucial step; however, the rapid exploitation indicates that organizations must act swiftly to mitigate risks. Key recommendations include:

  • Applying patches immediately: Ensure all affected systems are updated to the latest security patches.
  • Enhancing network defenses: Implement SMB signing, relay protections, and monitor SMB traffic for unusual activity.
  • User awareness: Educate users about the risks of opening untrusted archives or clicking on suspicious files.
  • Network segmentation: Limit SMB traffic between segments to reduce the attack surface.
  • Regular security audits: Conduct vulnerability assessments and monitor for signs of compromise.

The exploitation of CVE-2025-24054 exemplifies how attackers leverage seemingly benign file operations to leak sensitive authentication hashes, facilitating deeper infiltration into target networks.

The swift transition from patch release to active exploitation underscores the importance of rapid response and proactive security measures.

As threat actors continue to refine their tactics, organizations must prioritize timely patching, robust network security, and user education to defend against such sophisticated spoofing and hash disclosure attacks.

Malware Trends Report Based on 15000 SOC Teams Incidents, Q1 2025 out!-> Get Your Free Copy


文章来源: https://cybersecuritynews.com/hackers-exploiting-ntlm-spoofing-vulnerability/
如有侵权请联系:admin#unsafe.sh