Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24054, NTLM Exploit in the Wild

0
Medium
CampaignCVE-2025-24071malspamntlmspoofingcve-2025-24054
Published: Wed Apr 16 2025 (04/16/2025, 22:53:48 UTC)
Source: AlienVault OTX

Description

CVE-2025-24054 is a critical NTLM authentication vulnerability actively exploited since March 2025. Attackers leverage malicious . library-ms files to leak NTLM hashes or user passwords with minimal user interaction, such as right-clicking or browsing to a folder containing the crafted file. The campaign primarily targets government and private institutions in Poland and Romania via malspam emails containing Dropbox links. This vulnerability is a variant of the previously patched CVE-2024-43451 but remains unpatched in many environments. Compromised credentials enable lateral movement, privilege escalation, and full system compromise. European organizations relying on NTLM and lacking advanced endpoint protections are at high risk. Mitigations include restricting . library-ms file processing, enhancing email filtering, enforcing MFA, deploying EDR solutions, and disabling NTLM where feasible. Countries most affected include Poland, Romania, Ukraine, Germany, France, Italy, the UK, and Spain due to targeted campaigns and similar IT environments.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 06:40:18 UTC

Technical Analysis

CVE-2025-24054 is a critical vulnerability in the NTLM authentication protocol exploited in the wild since March 2025. The attack vector involves maliciously crafted .library-ms files—Windows shell library files—that when right-clicked or browsed to by a user, trigger leakage of NTLM hashes or plaintext user passwords. This minimal user interaction requirement significantly lowers the barrier for exploitation. The vulnerability is a variant of CVE-2024-43451, which was previously patched, but many environments remain unpatched or have incomplete mitigations. Attackers distribute payloads primarily through malspam campaigns containing Dropbox links, targeting government and private sector institutions, especially in Poland and Romania. Once credentials are obtained, attackers can perform lateral movement within networks, escalate privileges, and achieve full system compromise. The exploitation leverages weaknesses in how Windows processes .library-ms files and NTLM authentication, allowing credential theft without requiring elevated privileges or complex user actions. The campaign is attributed to the adversary group UAC-0194. The threat is significant for European organizations that still rely on NTLM authentication and lack advanced endpoint detection and response (EDR) capabilities. Mitigation strategies include restricting processing of .library-ms files, improving email filtering to block malicious links, enforcing multi-factor authentication (MFA) to reduce credential misuse, deploying EDR solutions to detect and respond to exploitation attempts, and disabling NTLM authentication where possible to eliminate the attack surface.

Potential Impact

For European organizations, the impact of CVE-2025-24054 is substantial. Successful exploitation leads to leakage of NTLM hashes or plaintext credentials, which can be used for lateral movement, privilege escalation, and full compromise of affected systems. This threatens confidentiality, integrity, and availability of critical systems and sensitive data. Government institutions and private enterprises in Poland and Romania are primary targets, but the campaign's reach extends to Ukraine, Germany, France, Italy, the UK, and Spain, where similar IT environments and reliance on NTLM exist. The use of malspam with Dropbox links increases the likelihood of initial compromise, especially in organizations with insufficient email filtering and endpoint protections. The vulnerability's exploitation can disrupt operations, lead to data breaches, and facilitate espionage or sabotage, particularly in strategic sectors. Organizations without robust mitigations face increased risk of persistent attacker presence and significant operational and reputational damage.

Mitigation Recommendations

To mitigate CVE-2025-24054, European organizations should implement the following specific measures: 1) Restrict or disable processing of .library-ms files through Group Policy or endpoint controls to prevent automatic handling of malicious files. 2) Enhance email security by deploying advanced filtering solutions that detect and block malspam campaigns, especially those containing links to cloud storage services like Dropbox. 3) Enforce multi-factor authentication (MFA) across all user accounts to reduce the risk of credential misuse even if hashes or passwords are leaked. 4) Deploy and maintain Endpoint Detection and Response (EDR) solutions capable of detecting suspicious file interactions and lateral movement behaviors associated with NTLM exploitation. 5) Where feasible, disable NTLM authentication in favor of more secure protocols such as Kerberos, or implement NTLM blocking policies to limit its use. 6) Conduct user awareness training focused on the risks of interacting with unknown files and links, emphasizing the minimal user interaction required for exploitation. 7) Regularly audit and patch systems to ensure any related vulnerabilities are addressed promptly. 8) Monitor network traffic for unusual authentication attempts or lateral movement indicative of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://research.checkpoint.com/2025/cve-2025-24054-ntlm-exploit-in-the-wild"]
Adversary
UAC-0194

Indicators of Compromise

Cve

ValueDescriptionCopy
cveCVE-2025-24071
cveCVE-2024-43451
cveCVE-2025-24054

Hash

ValueDescriptionCopy
hash9ca72d969d7c5494a30e996324c6c0fcb72ae1ae
hash84132ae00239e15b50c1a20126000eed29388100
hash76e93c97ffdb5adb509c966bca22e12c4508dcaa
hash7dd0131dd4660be562bc869675772e58a1e3ac8e
hash5e42c6d12f6b51364b6bfb170f4306c5ce608b4f
hash054784f1a398a35e0c5242cbfa164df0c277da73
hash7a43c177a582c777e258246f0ba818f9e73a69ab

Threat ID: 682c992c7960f6956616a2ab

Added to database: 5/20/2025, 3:01:00 PM

Last enriched: 2/14/2026, 6:40:18 AM

Last updated: 3/23/2026, 11:49:20 PM

Views: 147

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses