NTLM Credentials Theft via PDF Files
By
Just a few days after it was reported that malicious actors can exploit a vulnerability in MS outlook using OLE to steal a Windows user’s NTLM hashes, the Check Point research team can also reveal that NTLM hash leaks can also be achieved via PDF files with no user interaction or exploitation. According to Check […]
The post NTLM Credentials Theft via PDF Files appeared first on Check Point Research.
You may also like
Meet FunkSec: A New, Surprising Ransomware Group, Powered by AI
Executive Summary: The FunkSec ransomware group emerged in late 2024 ...
Cracking the Code: How Banshee Stealer Targets macOS Users
Executive Summary: Since September, Check Point Research (CPR) has been ...
November 2024’s Most Wanted Malware: Androxgh0st Leads the Pack, Targeting IoT Devices and Critical Infrastructure
Check Point Software’s latest threat index highlights the rise of ...
The Exploitation of Gaming Engines: A New Dimension in Cybercrime
Executive Summary Check Point Research discovered a new technique using ...