Skip to main content

CVE-2025-24054, NTLM Exploit in the Wild

Medium
CampaignCVE-2025-24071malspamntlmspoofingcve-2025-24054
Published: Wed Apr 16 2025 (04/16/2025, 22:53:48 UTC)
Source: AlienVault OTX

Description

A critical vulnerability, CVE-2025-24054, related to NTLM hash disclosure via spoofing, has been actively exploited since March 19, 2025. The flaw allows attackers to leak NTLM hashes or user passwords using a maliciously crafted .library-ms file, potentially compromising systems. A campaign targeting government and private institutions in Poland and Romania used malspam to distribute Dropbox links containing archives exploiting this vulnerability. The exploit can be triggered with minimal user interaction, such as right-clicking or navigating to the folder containing the malicious file. This vulnerability appears to be a variant of the previously patched CVE-2024-43451, sharing several similarities.

AI-Powered Analysis

AILast updated: 07/08/2025, 12:40:56 UTC

Technical Analysis

CVE-2025-24054 is a critical security vulnerability affecting Windows systems that utilize NTLM (NT LAN Manager) authentication. The flaw involves the disclosure of NTLM hashes or user passwords through a spoofing attack vector using maliciously crafted .library-ms files, which are Windows shell library files designed to aggregate folders and content. The exploit is triggered with minimal user interaction, such as right-clicking or simply navigating to a folder containing the malicious .library-ms file. This vulnerability is a variant of the previously patched CVE-2024-43451, sharing similar underlying mechanisms but remains unpatched in many environments. Since March 19, 2025, threat actors, notably the group UAC-0194, have actively exploited this vulnerability in targeted campaigns primarily against government and private institutions in Poland and Romania. The attack vector involves malspam emails containing Dropbox links to archives that deliver the malicious payload. The exploit requires no prior authentication and minimal user action, increasing its risk and ease of exploitation. The disclosure of NTLM hashes or passwords can enable attackers to perform credential theft, lateral movement, privilege escalation, and ultimately full system compromise. The campaign’s use of cloud storage links and social engineering tactics further complicates detection and prevention. The lack of available patches and the similarity to a previously patched vulnerability suggest that many legacy or unpatched Windows systems remain vulnerable, especially those relying on NTLM authentication and handling .library-ms files.

Potential Impact

For European organizations, particularly in Poland and Romania where active exploitation has been observed, this vulnerability poses a significant threat to confidentiality and integrity of sensitive data. The leakage of NTLM hashes or user passwords can lead to credential theft, enabling attackers to move laterally within networks, escalate privileges, and potentially compromise entire systems. Government institutions and private sector entities handling sensitive or classified information are at heightened risk due to the targeted nature of the campaign. The minimal user interaction required to trigger the exploit increases the likelihood of successful compromise, especially in environments with less mature security awareness or endpoint protections. Furthermore, stolen credentials can be reused in subsequent attacks such as ransomware deployment or espionage, amplifying the potential damage. Organizations still relying on NTLM authentication without additional security controls are particularly vulnerable. The use of malspam and cloud storage links as delivery mechanisms means that organizations with insufficient email filtering and endpoint detection capabilities may be disproportionately affected. Given the campaign’s regional focus, other European countries with similar IT environments or geopolitical importance, such as Germany, France, Italy, the United Kingdom, and Spain, are also at risk of targeted attacks or spillover.

Mitigation Recommendations

1. Restrict or disable processing of .library-ms files where feasible, especially in user directories and shared network locations, to prevent automatic triggering of the exploit. 2. Implement advanced email filtering rules to detect and block malspam emails containing suspicious Dropbox links or archive files, leveraging threat intelligence indicators such as the provided file hashes. 3. Enforce multi-factor authentication (MFA) across all systems to mitigate the impact of credential theft. 4. Deploy and tune endpoint detection and response (EDR) solutions to monitor for unusual NTLM authentication attempts or suspicious hash transmissions indicative of exploitation attempts. 5. Conduct targeted user awareness training emphasizing the risks of interacting with unsolicited emails and links, highlighting that minimal interaction can trigger this exploit. 6. Apply any available vendor patches or workarounds related to CVE-2024-43451 and CVE-2025-24054 promptly once released. 7. Where possible, disable or restrict NTLM authentication in favor of more secure protocols such as Kerberos to reduce attack surface. 8. Perform regular credential audits and enforce password resets if compromise is suspected to limit attacker persistence. 9. Utilize application whitelisting to prevent execution of unauthorized files and scripts that could facilitate exploitation. 10. Implement network segmentation to contain potential lateral movement following credential compromise. 11. Monitor network traffic for anomalous connections to cloud storage services like Dropbox that may be used in attack campaigns.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://research.checkpoint.com/2025/cve-2025-24054-ntlm-exploit-in-the-wild"]
Adversary
UAC-0194

Indicators of Compromise

Cve

ValueDescriptionCopy
cveCVE-2025-24071
cveCVE-2024-43451
cveCVE-2025-24054

Hash

ValueDescriptionCopy
hash9ca72d969d7c5494a30e996324c6c0fcb72ae1ae
hash84132ae00239e15b50c1a20126000eed29388100
hash76e93c97ffdb5adb509c966bca22e12c4508dcaa
hash7dd0131dd4660be562bc869675772e58a1e3ac8e
hash5e42c6d12f6b51364b6bfb170f4306c5ce608b4f
hash054784f1a398a35e0c5242cbfa164df0c277da73
hash7a43c177a582c777e258246f0ba818f9e73a69ab

Threat ID: 682c992c7960f6956616a2ab

Added to database: 5/20/2025, 3:01:00 PM

Last enriched: 7/8/2025, 12:40:56 PM

Last updated: 8/18/2025, 11:30:20 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats