CVE-2025-24054, NTLM Exploit in the Wild
CVE-2025-24054 is a critical NTLM authentication vulnerability actively exploited since March 2025. Attackers leverage malicious . library-ms files to leak NTLM hashes or user passwords with minimal user interaction, such as right-clicking or browsing to a folder containing the crafted file. The campaign primarily targets government and private institutions in Poland and Romania via malspam emails containing Dropbox links. This vulnerability is a variant of the previously patched CVE-2024-43451 but remains unpatched in many environments. Compromised credentials enable lateral movement, privilege escalation, and full system compromise. European organizations relying on NTLM and lacking advanced endpoint protections are at high risk. Mitigations include restricting . library-ms file processing, enhancing email filtering, enforcing MFA, deploying EDR solutions, and disabling NTLM where feasible. Countries most affected include Poland, Romania, Ukraine, Germany, France, Italy, the UK, and Spain due to targeted campaigns and similar IT environments.
AI Analysis
Technical Summary
CVE-2025-24054 is a critical vulnerability in the NTLM authentication protocol exploited in the wild since March 2025. The attack vector involves maliciously crafted .library-ms files—Windows shell library files—that when right-clicked or browsed to by a user, trigger leakage of NTLM hashes or plaintext user passwords. This minimal user interaction requirement significantly lowers the barrier for exploitation. The vulnerability is a variant of CVE-2024-43451, which was previously patched, but many environments remain unpatched or have incomplete mitigations. Attackers distribute payloads primarily through malspam campaigns containing Dropbox links, targeting government and private sector institutions, especially in Poland and Romania. Once credentials are obtained, attackers can perform lateral movement within networks, escalate privileges, and achieve full system compromise. The exploitation leverages weaknesses in how Windows processes .library-ms files and NTLM authentication, allowing credential theft without requiring elevated privileges or complex user actions. The campaign is attributed to the adversary group UAC-0194. The threat is significant for European organizations that still rely on NTLM authentication and lack advanced endpoint detection and response (EDR) capabilities. Mitigation strategies include restricting processing of .library-ms files, improving email filtering to block malicious links, enforcing multi-factor authentication (MFA) to reduce credential misuse, deploying EDR solutions to detect and respond to exploitation attempts, and disabling NTLM authentication where possible to eliminate the attack surface.
Potential Impact
For European organizations, the impact of CVE-2025-24054 is substantial. Successful exploitation leads to leakage of NTLM hashes or plaintext credentials, which can be used for lateral movement, privilege escalation, and full compromise of affected systems. This threatens confidentiality, integrity, and availability of critical systems and sensitive data. Government institutions and private enterprises in Poland and Romania are primary targets, but the campaign's reach extends to Ukraine, Germany, France, Italy, the UK, and Spain, where similar IT environments and reliance on NTLM exist. The use of malspam with Dropbox links increases the likelihood of initial compromise, especially in organizations with insufficient email filtering and endpoint protections. The vulnerability's exploitation can disrupt operations, lead to data breaches, and facilitate espionage or sabotage, particularly in strategic sectors. Organizations without robust mitigations face increased risk of persistent attacker presence and significant operational and reputational damage.
Mitigation Recommendations
To mitigate CVE-2025-24054, European organizations should implement the following specific measures: 1) Restrict or disable processing of .library-ms files through Group Policy or endpoint controls to prevent automatic handling of malicious files. 2) Enhance email security by deploying advanced filtering solutions that detect and block malspam campaigns, especially those containing links to cloud storage services like Dropbox. 3) Enforce multi-factor authentication (MFA) across all user accounts to reduce the risk of credential misuse even if hashes or passwords are leaked. 4) Deploy and maintain Endpoint Detection and Response (EDR) solutions capable of detecting suspicious file interactions and lateral movement behaviors associated with NTLM exploitation. 5) Where feasible, disable NTLM authentication in favor of more secure protocols such as Kerberos, or implement NTLM blocking policies to limit its use. 6) Conduct user awareness training focused on the risks of interacting with unknown files and links, emphasizing the minimal user interaction required for exploitation. 7) Regularly audit and patch systems to ensure any related vulnerabilities are addressed promptly. 8) Monitor network traffic for unusual authentication attempts or lateral movement indicative of exploitation attempts.
Affected Countries
Poland, Romania, Ukraine, Germany, France, Italy, United Kingdom, Spain
Indicators of Compromise
- cve: CVE-2025-24071
- cve: CVE-2024-43451
- cve: CVE-2025-24054
- hash: 9ca72d969d7c5494a30e996324c6c0fcb72ae1ae
- hash: 84132ae00239e15b50c1a20126000eed29388100
- hash: 76e93c97ffdb5adb509c966bca22e12c4508dcaa
- hash: 7dd0131dd4660be562bc869675772e58a1e3ac8e
- hash: 5e42c6d12f6b51364b6bfb170f4306c5ce608b4f
- hash: 054784f1a398a35e0c5242cbfa164df0c277da73
- hash: 7a43c177a582c777e258246f0ba818f9e73a69ab
CVE-2025-24054, NTLM Exploit in the Wild
Description
CVE-2025-24054 is a critical NTLM authentication vulnerability actively exploited since March 2025. Attackers leverage malicious . library-ms files to leak NTLM hashes or user passwords with minimal user interaction, such as right-clicking or browsing to a folder containing the crafted file. The campaign primarily targets government and private institutions in Poland and Romania via malspam emails containing Dropbox links. This vulnerability is a variant of the previously patched CVE-2024-43451 but remains unpatched in many environments. Compromised credentials enable lateral movement, privilege escalation, and full system compromise. European organizations relying on NTLM and lacking advanced endpoint protections are at high risk. Mitigations include restricting . library-ms file processing, enhancing email filtering, enforcing MFA, deploying EDR solutions, and disabling NTLM where feasible. Countries most affected include Poland, Romania, Ukraine, Germany, France, Italy, the UK, and Spain due to targeted campaigns and similar IT environments.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-24054 is a critical vulnerability in the NTLM authentication protocol exploited in the wild since March 2025. The attack vector involves maliciously crafted .library-ms files—Windows shell library files—that when right-clicked or browsed to by a user, trigger leakage of NTLM hashes or plaintext user passwords. This minimal user interaction requirement significantly lowers the barrier for exploitation. The vulnerability is a variant of CVE-2024-43451, which was previously patched, but many environments remain unpatched or have incomplete mitigations. Attackers distribute payloads primarily through malspam campaigns containing Dropbox links, targeting government and private sector institutions, especially in Poland and Romania. Once credentials are obtained, attackers can perform lateral movement within networks, escalate privileges, and achieve full system compromise. The exploitation leverages weaknesses in how Windows processes .library-ms files and NTLM authentication, allowing credential theft without requiring elevated privileges or complex user actions. The campaign is attributed to the adversary group UAC-0194. The threat is significant for European organizations that still rely on NTLM authentication and lack advanced endpoint detection and response (EDR) capabilities. Mitigation strategies include restricting processing of .library-ms files, improving email filtering to block malicious links, enforcing multi-factor authentication (MFA) to reduce credential misuse, deploying EDR solutions to detect and respond to exploitation attempts, and disabling NTLM authentication where possible to eliminate the attack surface.
Potential Impact
For European organizations, the impact of CVE-2025-24054 is substantial. Successful exploitation leads to leakage of NTLM hashes or plaintext credentials, which can be used for lateral movement, privilege escalation, and full compromise of affected systems. This threatens confidentiality, integrity, and availability of critical systems and sensitive data. Government institutions and private enterprises in Poland and Romania are primary targets, but the campaign's reach extends to Ukraine, Germany, France, Italy, the UK, and Spain, where similar IT environments and reliance on NTLM exist. The use of malspam with Dropbox links increases the likelihood of initial compromise, especially in organizations with insufficient email filtering and endpoint protections. The vulnerability's exploitation can disrupt operations, lead to data breaches, and facilitate espionage or sabotage, particularly in strategic sectors. Organizations without robust mitigations face increased risk of persistent attacker presence and significant operational and reputational damage.
Mitigation Recommendations
To mitigate CVE-2025-24054, European organizations should implement the following specific measures: 1) Restrict or disable processing of .library-ms files through Group Policy or endpoint controls to prevent automatic handling of malicious files. 2) Enhance email security by deploying advanced filtering solutions that detect and block malspam campaigns, especially those containing links to cloud storage services like Dropbox. 3) Enforce multi-factor authentication (MFA) across all user accounts to reduce the risk of credential misuse even if hashes or passwords are leaked. 4) Deploy and maintain Endpoint Detection and Response (EDR) solutions capable of detecting suspicious file interactions and lateral movement behaviors associated with NTLM exploitation. 5) Where feasible, disable NTLM authentication in favor of more secure protocols such as Kerberos, or implement NTLM blocking policies to limit its use. 6) Conduct user awareness training focused on the risks of interacting with unknown files and links, emphasizing the minimal user interaction required for exploitation. 7) Regularly audit and patch systems to ensure any related vulnerabilities are addressed promptly. 8) Monitor network traffic for unusual authentication attempts or lateral movement indicative of exploitation attempts.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://research.checkpoint.com/2025/cve-2025-24054-ntlm-exploit-in-the-wild"]
- Adversary
- UAC-0194
Indicators of Compromise
Cve
| Value | Description | Copy |
|---|---|---|
cveCVE-2025-24071 | — | |
cveCVE-2024-43451 | — | |
cveCVE-2025-24054 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash9ca72d969d7c5494a30e996324c6c0fcb72ae1ae | — | |
hash84132ae00239e15b50c1a20126000eed29388100 | — | |
hash76e93c97ffdb5adb509c966bca22e12c4508dcaa | — | |
hash7dd0131dd4660be562bc869675772e58a1e3ac8e | — | |
hash5e42c6d12f6b51364b6bfb170f4306c5ce608b4f | — | |
hash054784f1a398a35e0c5242cbfa164df0c277da73 | — | |
hash7a43c177a582c777e258246f0ba818f9e73a69ab | — |
Threat ID: 682c992c7960f6956616a2ab
Added to database: 5/20/2025, 3:01:00 PM
Last enriched: 2/14/2026, 6:40:18 AM
Last updated: 3/24/2026, 7:49:32 PM
Views: 148
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.