Hackers Exploit Windows Flaw: NTLM Hashes at Risk in Sneaky Phishing Attack
Hackers are exploiting a Windows vulnerability to capture NTLM hashes using .library-ms files, targeting government and private entities. Despite being patched, active exploitation was observed shortly after. The flaw, CVE-2025-24054, poses a significant risk with minimal user interaction needed, prompting urgent security updates and disabling NTLM where unnecessary.

Hot Take:
Who knew that a seemingly innocuous .library-ms file could pack such a punch? It’s like finding out your cat has been secretly leading a double life as a cybercriminal. If you’ve been using NTLM like it’s 1999, it’s time to let go and embrace Kerberos—because NTLM is basically the MySpace of authentication protocols right now.
Key Points:
- CVE-2025-24054 is a Windows vulnerability that exposes NTLM hashes using .library-ms files.
- The flaw was initially not considered actively exploited but is now being used in phishing campaigns.
- Phishing emails targeting Polish and Romanian entities included malicious .library-ms files.
- The attacks involve remote SMB servers capturing NTLM hashes for potential privilege escalation.
- Organizations are advised to update systems and disable NTLM if possible.
Already a member? Log in here