A critical zero-day vulnerability in Microsoft Windows exposes millions of users to NTLM credential theft. Affecting Windows 7 to Windows 11 24H2, the flaw allows attackers to steal login credentials by merely viewing a malicious file in Windows Explorer, without opening it. This compromises sensitive systems, data, and networks.
The vulnerability, which targets the NTLM credential stealing, is the third serious zero-day in recent months affecting the Windows OS, the Personal and the Server editions, the MOTW bypass, and the Windows Theme exploit. This weakness can be turned into a threat and result in lateral movement in the network, escalating privileges, and, eventually, complete system compromise.
Microsoft has not yet released the official patch, but National CERT has provided the most important measures to prevent this risk. The advisory calls for immediate action, including:
To minimize exposure, National CERT recommends organizations compartmentalize their network, separate the core systems from the less secure infrastructure, and analyze the NTLM traffic with the help of, the Security Information and Event Management system. Accessing the files should also be prohibited by using limited file access privileges, turning off preview in Windows Explorer and extremely restricted access are some of the measures that should also be taken.
This vulnerability can also be defended by raising user awareness. National CERT suggests increasing user’s awareness of file risks, enforcing strict password policies, and advocating for safe file sharing. Users should be taught how not to work with files received from unknown sources, for example, by email or a flash drive.
To limit the usage of NTLM, organizations need to start to use safer methods of authentication for example Kerberos or certificate authentication. Removing dependence on NTLM in currently implemented legacy systems will also strengthen security and bring infrastructures into compliance.
There is always the need for organizations to constantly monitor access logs, use alarms for detected abnormalities, and have a quick response plan on how to contain and restore from the breach. Following these recommendations to the letter is crucial now to avoid possibly dangerous situations as Microsoft is still preparing the patch.
National CERT stresses that the absence of those measures would result in serious violations, data theft, and critical system compromisation. The steps highlighted above are important to prevent systems from being exploited.
The Vancouver City Council has approved a plan to investigate the potential of using Bitcoin…
Laam, a Lahore-based online marketplace, has secured $5.5 million in an all-equity seed round led…
If you're using an iPhone and a Windows PC, you've definitely noticed the challenge of…
WhatsApp has added a new feature called "quick reply" for beta users. This will make…
Islamabad: The Ministry of Finance has revealed that over Rs. 3 trillion in taxes has…
Five people have been fined more than $5 million by a California court for their…