A critical zero-day vulnerability in Microsoft Windows exposes millions of users to NTLM credential theft. Affecting Windows 7 to Windows 11 24H2, the flaw allows attackers to steal login credentials by merely viewing a malicious file in Windows Explorer, without opening it. This compromises sensitive systems, data, and networks.
The vulnerability, which targets the NTLM credential stealing, is the third serious zero-day in recent months affecting the Windows OS, the Personal and the Server editions, the MOTW bypass, and the Windows Theme exploit. This weakness can be turned into a threat and result in lateral movement in the network, escalating privileges, and, eventually, complete system compromise.
Microsoft has not yet released the official patch, but National CERT has provided the most important measures to prevent this risk. The advisory calls for immediate action, including:
To minimize exposure, National CERT recommends organizations compartmentalize their network, separate the core systems from the less secure infrastructure, and analyze the NTLM traffic with the help of, the Security Information and Event Management system. Accessing the files should also be prohibited by using limited file access privileges, turning off preview in Windows Explorer and extremely restricted access are some of the measures that should also be taken.
This vulnerability can also be defended by raising user awareness. National CERT suggests increasing user’s awareness of file risks, enforcing strict password policies, and advocating for safe file sharing. Users should be taught how not to work with files received from unknown sources, for example, by email or a flash drive.
To limit the usage of NTLM, organizations need to start to use safer methods of authentication for example Kerberos or certificate authentication. Removing dependence on NTLM in currently implemented legacy systems will also strengthen security and bring infrastructures into compliance.
There is always the need for organizations to constantly monitor access logs, use alarms for detected abnormalities, and have a quick response plan on how to contain and restore from the breach. Following these recommendations to the letter is crucial now to avoid possibly dangerous situations as Microsoft is still preparing the patch.
National CERT stresses that the absence of those measures would result in serious violations, data theft, and critical system compromisation. The steps highlighted above are important to prevent systems from being exploited.
A petition has been submitted to the Lahore High Court (LHC) seeking an emergency prohibition…
Xiaomi has officially expanded its global reach with the release of the Redmi Note 14…
Punjab schools will resume classes on January 13 after the winter break, with the Department…
Punjab Chief Minister Maryam Nawaz Sharif has introduced the Honhar Laptop Scheme 2025, a transformative…
The federal cabinet has approved an amendment to the Pakistan Telecommunication (Re-Organisation) Act, 1996, addressing…
Apple is set to unveil its fourth-generation iPhone SE, anticipated for release in the first…