top of page

Zombie Protocol: How NTLM Flaws Like CVE-2024-43451 Are Haunting 2025

  • Nov 28, 2025
  • 2 min read

Key Findings


  • Despite being over two decades old, the NTLM authentication protocol remains a critical security liability in 2025.

  • Cybercriminals are actively exploiting newly discovered vulnerabilities to launch sophisticated attacks across the globe.

  • One of the most alarming vulnerabilities is CVE-2024-43451, which allows attackers to steal a user's NTLMv2 hash with virtually no interaction.

  • The vulnerability abuses the MSHTML engine to trigger an NTLM authentication attempt to an attacker-controlled server simply by being selected, right-clicked, or deleted.

  • Specific threat actors like BlindEagle, Head Mare, and Trojan Distribution have weaponized these flaws to target various sectors.

  • A high-severity NTLM reflection vulnerability, CVE-2025-33073, allows an internal attacker to trick a system into authenticating against itself, granting them SYSTEM-level privileges.

  • The persistence of NTLM in 2025 highlights the challenge of legacy debt in cybersecurity.


Background


In 2001, the cybersecurity world was rocked by the first major NTLM relay attack tool. Fast forward to 2025, and the legacy protocol is still haunting enterprise networks. Kaspersky's latest research highlights a surge in NTLM-related exploits over the past year, despite Microsoft's ongoing efforts to deprecate the protocol.


CVE-2024-43451: The "Clickless" NTLM Exploit


One of the most alarming vulnerabilities detailed in the report is CVE-2024-43451, a flaw that allows attackers to steal a user's NTLMv2 hash with virtually no interaction. The vulnerability abuses the MSHTML engine—a legacy component of Internet Explorer that still exists in Windows for backward compatibility. Attackers can craft malicious .url files that trigger an NTLM authentication attempt to an attacker-controlled server simply by being selected, right-clicked, or deleted.


Threat Actor Weaponization


The report tracks specific threat actors who have weaponized these flaws:


  • BlindEagle (Colombia): This APT group targeted Colombian government entities using phishing emails disguised as judicial notifications. They used the .url exploit to silently download and execute the Remcos RAT.

  • Head Mare (Russia/Belarus): A hacktivist group targeted the manufacturing and education sectors in Russia. They distributed malicious ZIP files containing .url exploits disguised as "Service Agreements," leading to the deployment of PhantomCore malware.

  • Trojan Distribution (Russia): A separate campaign used CVE-2025-24054 to distribute the AveMaria (Warzone) Trojan via malicious .library-ms files hidden inside ZIP archives.


CVE-2025-33073: NTLM Reflection Vulnerability


The most technical finding involves CVE-2025-33073, a high-severity NTLM reflection vulnerability. This flaw allows an internal attacker to trick a system into authenticating against itself, effectively granting them SYSTEM-level privileges. In a documented incident in Uzbekistan's financial sector, an attacker used a crafted DNS hostname to bypass Windows' local authentication checks and coerce the host into authenticating against itself.


The Persistence of NTLM in 2025


The persistence of NTLM in 2025 highlights a critical challenge in cybersecurity: legacy debt. The report concludes that NTLM remains deeply entrenched in Windows environments, continuing to offer cybercriminals opportunities to exploit its long-known weaknesses. Kaspersky experts urge organizations to accelerate their move to Kerberos, enforce SMB signing and EPA (Extended Protection for Authentication), and audit their networks for NTLM traffic to mitigate these threats.


Sources


  • https://securityonline.info/zombie-protocol-how-ntlm-flaws-like-cve-2024-43451-are-haunting-2025/

  • https://x.com/the_yellow_fall/status/1994225510759768420

  • https://x.com/fridaysecurity/status/1994225866264502273

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page