"Phishing Attacks Target Windows NTLM Authentication with Weaponized ZIP File"

TL;DR Summary
The hacking group TA577 has shifted to using phishing emails to steal NTLM authentication hashes, targeting employees in organizations worldwide. These hashes can be used for offline password cracking or "pass-the-hash" attacks, potentially enabling attackers to escalate privileges, hijack accounts, access sensitive information, and move laterally within a breached network. The phishing emails contain unique ZIP archives with HTML files that trigger automatic connections to steal the NTLM hashes. Security measures such as multi-factor authentication, firewall configurations, email filtering, and Windows 11 security features can help mitigate these attacks.
- Hackers steal Windows NTLM authentication hashes in phishing attacks BleepingComputer
- TA577 Exploits NTLM Authentication Vulnerability Infosecurity Magazine
- Malicious email campaign steals NTLM hashes CSO Online
- Hackers Using Weaponized ZIP File To Steal NTLM Hashes CybersecurityNews
Reading Insights
Total Reads
0
Unique Readers
1
Time Saved
3 min
vs 4 min read
Condensed
85%
603 → 89 words
Want the full story? Read the original article
Read on BleepingComputer