
NTLM Credentials Theft via PDF Files

By
Just a few days after it was reported that malicious actors can exploit a vulnerability in MS outlook using OLE to steal a Windows user’s NTLM hashes, the Check Point research team can also reveal that NTLM hash leaks can also be achieved via PDF files with no user interaction or exploitation. According to Check […]
The post NTLM Credentials Theft via PDF Files appeared first on Check Point Research.
You may also like
How hunting for vulnerable drivers unraveled a widespread attack
Attackers are increasingly targeting vulnerabilities in drivers, which operate in ...
Patch Now: Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection
A newly identified threat activity cluster leveraged the already-patched Check ...
Cyber Criminals Using URL Tricks to Deceive Users
Overview: In a newly observed scam, Check Point researchers found ...
Check Point’s SASE Tops Scores for Threat Prevention
Known malware is dangerous, but the real risk lies in ...