No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

How to Protect Your Environment from the NTLM Vulnerability

December 22, 2024
in Protection
0
How to Protect Your Environment from the NTLM Vulnerability


A new zero-day vulnerability in NTLM discovered by researchers at 0patch allows attackers to steal NTLM credentials by having a user view a specially crafted malicious file in Windows Explorer — no need for the user to open the file. These password hashes can be used for authentication relay attacks or for dictionary attacks on the password, both for identity takeover.

NTLM refers to a suite of old authentication protocols from Microsoft that provide authentication, integrity, and confidentiality to users. While NTLM was officially deprecated as of June, our research shows that 64% of Active Directory user accounts regularly authenticate with NTLM — evidence that NTLM is still widely used despite its known weaknesses.

The flaw is exploitable even in environments using NTLM v2, making it a significant risk to enterprises that have not yet moved to Kerberos and are still relying on NTLM. Considering Microsoft may not patch this issue for a while, enterprise defenders should take steps to mitigate the vulnerability in their environments. This Tech Tip outlines how dynamic access policies, a few hardening steps, and multifactor authentication (MFA) can help limit attempts to exploit this vulnerability. Upgrading the protocol, where possible, could eliminate the issue completely.

What Is the NTLM Vulnerability?

When a user views a malicious file in Windows Explorer — whether by navigating to a shared folder, inserting a USB drive containing the malicious file, or just viewing a file in the Downloads folder that was automatically downloaded from a malicious Web page — an outbound NTLM connection is triggered. This causes Windows to automatically send NTLM hashes of the currently logged-in user to a remote attacker-controlled share.

These NTLM hashes can then be intercepted and used for authentication relay attacks or even dictionary attacks, granting attackers unauthorized access to sensitive systems. Attackers can also potentially use the exposed passwords to access the organization’s software-as-a-service (SaaS) environment due to the high rates of synced users.

The issue impacts all Windows versions from Windows 7 and Server 2008 R2 up to the latest Windows 11 24H2 and Server 2022.

The fundamental problem with NTLM lies in its outdated protocol design. NTLM transmits password hashes instead of verifying plaintext passwords, making it vulnerable to interception and exploitation. Even with NTLM v2, which uses stronger encryption, the hashes can still be captured and relayed by attackers. NTLM’s reliance on weak cryptographic practices and lack of protection against relay attacks are key weaknesses that make it highly exploitable. Moreover, NTLM authentication does not support modern security features, such as MFA, leaving systems open to a variety of credential theft techniques, such as pass-the-hash and hash relaying.

What Defenders Need to Do

To mitigate this vulnerability, Microsoft has updated previous guidance on how to enable Extended Protection for Authentication (EPA) on LDAP, Active Directory Certificate Services (AD CS), and Exchange Server. On Windows Server 2022 and 2019, administrators can manually enable EPA for AD CS and channel binding for LDAP. There are scripts provided by Microsoft to activate EPA manually on Exchange Server 2016. Where possible, update to the latest Windows Server 2025 as it ships with EPA and channel binding enabled by default for both AD CS and LDAP.

Some organizations may still be dependent on NTLM due to legacy systems. Those teams should consider additional authentication layers, such as dynamic risk-based policies, for protecting existing NTLM legacy systems against exploitations.

Harden LDAP configurations. Configure LDAP to enforce channel binding and monitor for legacy clients that may not support these settings.

Check impact on SaaS. If you are unsure whether there are applications or clients in your environment that rely on NTLMv2, you can use Group Policy to enable the Network Security: Restrict NTLM: Audit incoming NTLM traffic policy setting. This will not block NTLMv2 traffic but will log all attempts to authenticate using NTLMv2 in the Operations Log. By analyzing these logs, you can identify which client applications, servers, or services still rely on NTLMv2, so you can make targeted adjustments or updates.

Using Group Policy to limit or disable NTLM authentication via the Network Security: Restrict NTLM setting will reduce the risk of fallback scenarios where NTLM is unintentionally used.

Monitor SMB traffic. Enabling SMB signing and encryption can help prevent attackers from impersonating legitimate servers and triggering NTLM authentication. Blocking outbound SMB traffic to untrusted networks will also reduce the risk of NTLM credential leakage to rogue servers. Implement network monitoring and alerting for unusual SMB traffic patterns, particularly outbound requests to unknown or untrusted IP addresses.

Leave NTLM behind. NTLM has been deprecated. Administrators should audit NTLM usage to identify which systems still rely on NTLM. Organizations should prioritize transitioning those systems away from NTLM to more modern authentication protocols, such as Kerberos. Once a more modern protocol is in place, implement MFA to add an additional layer of protection.

Taking these steps will help organizations address the fundamental flaws in NTLM and improve their security posture.



Editorial Team

Editorial Team

Related Posts

Your Instagram Conversations Won’t Be so Private Anymore
Protection

Your Instagram Conversations Won’t Be so Private Anymore

May 8, 2026
These Are The Best Ways to Rid Your Gmail Inbox of Spam
Protection

These Are The Best Ways to Rid Your Gmail Inbox of Spam

May 8, 2026
10 Hacks Every Google Meet User Should Know
Protection

10 Hacks Every Google Meet User Should Know

May 8, 2026
The Fitbit App Is Losing All These Features
Protection

The Fitbit App Is Losing All These Features

May 8, 2026
You Can Get $35 in Google Store Credit If You Preorder the Fitbit Air
Protection

You Can Get $35 in Google Store Credit If You Preorder the Fitbit Air

May 8, 2026
The Shokz OpenRun Pro 2 Are $40 Off Right Now
Protection

The Shokz OpenRun Pro 2 Are $40 Off Right Now

May 8, 2026
Load More
Next Post
Is Recursion Pharmaceuticals Stock a Millionaire Maker?

Is Recursion Pharmaceuticals Stock a Millionaire Maker?

Popular News

  • Josh Garber

    How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • There’s a new worry keeping Treasury yields and borrowing costs higher

    0 shares
    Share 0 Tweet 0
  • Powell signals cautious Fed stance, lowering rate cut expectations through 2026

    0 shares
    Share 0 Tweet 0
  • Career & Academic Advisor – HigherEdJobs

    0 shares
    Share 0 Tweet 0
  • New TSP Catch‑Up Contribution Rules in 2026

    0 shares
    Share 0 Tweet 0

Latest News

Bitcoin

Bitcoin Retail Capitulating At Fastest Pace In 2 Years

May 9, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure On-chain data shows the Bitcoin network is...

China April exports rebound strongly after sluggish March, trade surplus widens

China April exports rebound strongly after sluggish March, trade surplus widens

May 9, 2026
0

China April exports rebound strongly after sluggish March, trade surplus widens

Cointelegraph

CLARITY Act sees ‘big step forward’ as markup set for May 14

May 9, 2026
0

The US CLARITY Act, which aims to provide the US crypto industry with greater regulatory clarity, is set to be...

Student Success Coach, Shipyard Workforce Development and Training

Student Success Coach, Shipyard Workforce Development and Training

May 9, 2026
0

Job Number: 050520261Closing Date: 6/4/2026 11:59 PM EasternPosition Description Hudson County Community CollegeStudent Success Coach, Shipyard Workforce Development and Training...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.