CVE-2025-24054, NTLM Exploit in the Wild
CVE-2025-24054 is a critical NTLM authentication vulnerability actively exploited since March 2025, enabling attackers to leak NTLM hashes or user passwords via malicious . library-ms files. Exploitation requires minimal user interaction, such as right-clicking or browsing to a folder containing the crafted file. The attack campaign primarily targets government and private institutions in Poland and Romania, distributing payloads through malspam emails with Dropbox links. This vulnerability is a variant of the previously patched CVE-2024-43451 but remains unpatched in many environments. The disclosed credentials can facilitate lateral movement, privilege escalation, and full system compromise. European organizations relying on NTLM authentication and lacking advanced endpoint protections are at significant risk. Mitigations include restricting . library-ms file processing, enhancing email filtering, enforcing MFA, deploying EDR solutions, and disabling NTLM where possible. Countries most affected include Poland, Romania, Ukraine, Germany, France, Italy, the UK, and Spain due to targeted campaigns and similar IT environments.
AI Analysis
Technical Summary
CVE-2025-24054 is a critical security vulnerability affecting Windows systems that utilize NTLM authentication. The flaw involves the disclosure of NTLM hashes or user passwords through a spoofing attack vector using maliciously crafted .library-ms files, which are Windows shell library files designed to aggregate folders and content. The exploit is triggered with minimal user interaction, such as right-clicking or simply navigating to a folder containing the malicious .library-ms file. This vulnerability is a variant of the previously patched CVE-2024-43451, sharing similar underlying mechanisms but remains unpatched in many environments. Since March 19, 2025, threat actors, notably the group UAC-0194, have actively exploited this vulnerability in targeted campaigns primarily against government and private institutions in Poland and Romania. The attack vector involves malspam emails containing Dropbox links to archives that deliver the malicious payload. The exploit requires no prior authentication and minimal user action, increasing its risk and ease of exploitation. The disclosure of NTLM hashes or passwords can enable attackers to perform credential theft, lateral movement, privilege escalation, and ultimately full system compromise. The campaign’s use of cloud storage links and social engineering tactics further complicates detection and prevention. The lack of available patches and the similarity to a previously patched vulnerability suggest that many legacy or unpatched Windows systems remain vulnerable, especially those relying on NTLM authentication and handling .library-ms files.
Potential Impact
For European organizations, particularly in Poland and Romania where active exploitation has been observed, this vulnerability poses a significant threat to confidentiality and integrity of sensitive data. The leakage of NTLM hashes or user passwords can lead to credential theft, enabling attackers to move laterally within networks, escalate privileges, and potentially compromise entire systems. Government institutions and private sector entities handling sensitive or classified information are at heightened risk due to the targeted nature of the campaign. The minimal user interaction required to trigger the exploit increases the likelihood of successful compromise, especially in environments with less mature security awareness or endpoint protections. Furthermore, stolen credentials can be reused in subsequent attacks such as ransomware deployment or espionage, amplifying the potential damage. Organizations still relying on NTLM authentication without additional security controls are particularly vulnerable. The use of malspam and cloud storage links as delivery mechanisms means that organizations with insufficient email filtering and endpoint detection capabilities may be disproportionately affected. Given the campaign’s regional focus, other European countries with similar IT environments or geopolitical importance, such as Germany, France, Italy, the United Kingdom, and Spain, are also at risk of targeted attacks or spillover.
Mitigation Recommendations
1. Restrict or disable processing of .library-ms files where feasible, especially in user directories and shared network locations, to prevent automatic triggering of the exploit. 2. Implement advanced email filtering rules to detect and block malspam emails containing suspicious Dropbox links or archive files, leveraging threat intelligence indicators such as the provided file hashes. 3. Enforce multi-factor authentication (MFA) across all systems to mitigate the impact of credential theft. 4. Deploy and tune endpoint detection and response (EDR) solutions to monitor for unusual NTLM authentication attempts or suspicious hash transmissions indicative of exploitation attempts. 5. Conduct targeted user awareness training emphasizing the risks of interacting with unsolicited emails and links, highlighting that minimal interaction can trigger this exploit. 6. Apply any available vendor patches or workarounds related to CVE-2024-43451 and CVE-2025-24054 promptly once released. 7. Where possible, disable or restrict NTLM authentication in favor of more secure protocols such as Kerberos to reduce attack surface. 8. Perform regular credential audits and enforce password resets if compromise is suspected to limit attacker persistence. 9. Utilize application whitelisting to prevent execution of unauthorized files and scripts that could facilitate exploitation. 10. Implement network segmentation to contain potential lateral movement following credential compromise. 11. Monitor network traffic for anomalous connections to cloud storage services like Dropbox that may be used in attack campaigns.
Affected Countries
Poland, Romania, Ukraine, Germany, France, Italy, United Kingdom, Spain
Indicators of Compromise
- cve: CVE-2025-24071
- cve: CVE-2024-43451
- cve: CVE-2025-24054
- hash: 9ca72d969d7c5494a30e996324c6c0fcb72ae1ae
- hash: 84132ae00239e15b50c1a20126000eed29388100
- hash: 76e93c97ffdb5adb509c966bca22e12c4508dcaa
- hash: 7dd0131dd4660be562bc869675772e58a1e3ac8e
- hash: 5e42c6d12f6b51364b6bfb170f4306c5ce608b4f
- hash: 054784f1a398a35e0c5242cbfa164df0c277da73
- hash: 7a43c177a582c777e258246f0ba818f9e73a69ab
CVE-2025-24054, NTLM Exploit in the Wild
Description
CVE-2025-24054 is a critical NTLM authentication vulnerability actively exploited since March 2025, enabling attackers to leak NTLM hashes or user passwords via malicious . library-ms files. Exploitation requires minimal user interaction, such as right-clicking or browsing to a folder containing the crafted file. The attack campaign primarily targets government and private institutions in Poland and Romania, distributing payloads through malspam emails with Dropbox links. This vulnerability is a variant of the previously patched CVE-2024-43451 but remains unpatched in many environments. The disclosed credentials can facilitate lateral movement, privilege escalation, and full system compromise. European organizations relying on NTLM authentication and lacking advanced endpoint protections are at significant risk. Mitigations include restricting . library-ms file processing, enhancing email filtering, enforcing MFA, deploying EDR solutions, and disabling NTLM where possible. Countries most affected include Poland, Romania, Ukraine, Germany, France, Italy, the UK, and Spain due to targeted campaigns and similar IT environments.
AI-Powered Analysis
Technical Analysis
CVE-2025-24054 is a critical security vulnerability affecting Windows systems that utilize NTLM authentication. The flaw involves the disclosure of NTLM hashes or user passwords through a spoofing attack vector using maliciously crafted .library-ms files, which are Windows shell library files designed to aggregate folders and content. The exploit is triggered with minimal user interaction, such as right-clicking or simply navigating to a folder containing the malicious .library-ms file. This vulnerability is a variant of the previously patched CVE-2024-43451, sharing similar underlying mechanisms but remains unpatched in many environments. Since March 19, 2025, threat actors, notably the group UAC-0194, have actively exploited this vulnerability in targeted campaigns primarily against government and private institutions in Poland and Romania. The attack vector involves malspam emails containing Dropbox links to archives that deliver the malicious payload. The exploit requires no prior authentication and minimal user action, increasing its risk and ease of exploitation. The disclosure of NTLM hashes or passwords can enable attackers to perform credential theft, lateral movement, privilege escalation, and ultimately full system compromise. The campaign’s use of cloud storage links and social engineering tactics further complicates detection and prevention. The lack of available patches and the similarity to a previously patched vulnerability suggest that many legacy or unpatched Windows systems remain vulnerable, especially those relying on NTLM authentication and handling .library-ms files.
Potential Impact
For European organizations, particularly in Poland and Romania where active exploitation has been observed, this vulnerability poses a significant threat to confidentiality and integrity of sensitive data. The leakage of NTLM hashes or user passwords can lead to credential theft, enabling attackers to move laterally within networks, escalate privileges, and potentially compromise entire systems. Government institutions and private sector entities handling sensitive or classified information are at heightened risk due to the targeted nature of the campaign. The minimal user interaction required to trigger the exploit increases the likelihood of successful compromise, especially in environments with less mature security awareness or endpoint protections. Furthermore, stolen credentials can be reused in subsequent attacks such as ransomware deployment or espionage, amplifying the potential damage. Organizations still relying on NTLM authentication without additional security controls are particularly vulnerable. The use of malspam and cloud storage links as delivery mechanisms means that organizations with insufficient email filtering and endpoint detection capabilities may be disproportionately affected. Given the campaign’s regional focus, other European countries with similar IT environments or geopolitical importance, such as Germany, France, Italy, the United Kingdom, and Spain, are also at risk of targeted attacks or spillover.
Mitigation Recommendations
1. Restrict or disable processing of .library-ms files where feasible, especially in user directories and shared network locations, to prevent automatic triggering of the exploit. 2. Implement advanced email filtering rules to detect and block malspam emails containing suspicious Dropbox links or archive files, leveraging threat intelligence indicators such as the provided file hashes. 3. Enforce multi-factor authentication (MFA) across all systems to mitigate the impact of credential theft. 4. Deploy and tune endpoint detection and response (EDR) solutions to monitor for unusual NTLM authentication attempts or suspicious hash transmissions indicative of exploitation attempts. 5. Conduct targeted user awareness training emphasizing the risks of interacting with unsolicited emails and links, highlighting that minimal interaction can trigger this exploit. 6. Apply any available vendor patches or workarounds related to CVE-2024-43451 and CVE-2025-24054 promptly once released. 7. Where possible, disable or restrict NTLM authentication in favor of more secure protocols such as Kerberos to reduce attack surface. 8. Perform regular credential audits and enforce password resets if compromise is suspected to limit attacker persistence. 9. Utilize application whitelisting to prevent execution of unauthorized files and scripts that could facilitate exploitation. 10. Implement network segmentation to contain potential lateral movement following credential compromise. 11. Monitor network traffic for anomalous connections to cloud storage services like Dropbox that may be used in attack campaigns.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://research.checkpoint.com/2025/cve-2025-24054-ntlm-exploit-in-the-wild"]
- Adversary
- UAC-0194
Indicators of Compromise
Cve
| Value | Description | Copy |
|---|---|---|
cveCVE-2025-24071 | — | |
cveCVE-2024-43451 | — | |
cveCVE-2025-24054 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash9ca72d969d7c5494a30e996324c6c0fcb72ae1ae | — | |
hash84132ae00239e15b50c1a20126000eed29388100 | — | |
hash76e93c97ffdb5adb509c966bca22e12c4508dcaa | — | |
hash7dd0131dd4660be562bc869675772e58a1e3ac8e | — | |
hash5e42c6d12f6b51364b6bfb170f4306c5ce608b4f | — | |
hash054784f1a398a35e0c5242cbfa164df0c277da73 | — | |
hash7a43c177a582c777e258246f0ba818f9e73a69ab | — |
Threat ID: 682c992c7960f6956616a2ab
Added to database: 5/20/2025, 3:01:00 PM
Last enriched: 12/17/2025, 11:31:03 PM
Last updated: 1/18/2026, 4:19:22 AM
Views: 94
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
HUMINT Operations Uncover Cryptojacking Campaign: Discord-Based Distribution of Clipboard Hijacking Malware Targeting Cryptocurrency Communities
MediumInside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations
MediumNew Magecart Network Uncovered: Disrupting Online Shoppers Worldwide
MediumReflecting on AI in 2025: Faster Attacks, Same Old Tradecraft
MediumCNCERT: Risk Warning Regarding the "Black Cat" Gang's Use of Search Engines to Spread Counterfeit Notepad++ Download Remote Control Backdoors
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.