
NTLM Credentials Theft via PDF Files

By
Just a few days after it was reported that malicious actors can exploit a vulnerability in MS outlook using OLE to steal a Windows user’s NTLM hashes, the Check Point research team can also reveal that NTLM hash leaks can also be achieved via PDF files with no user interaction or exploitation. According to Check […]
The post NTLM Credentials Theft via PDF Files appeared first on Check Point Research.
You may also like
Lumma Infostealer – Down but Not Out?
Key Findings: The takedown achieved a significant disruption to Lumma ...
Exploiting the AI Boom: How Threat Actors Are Targeting Trust in Generative Platforms like Kling AI
In early 2025, Check Point Research identified a cyber attack ...
Phishing Campaign Mimics Email Quarantine Notifications: 32,000 Emails Target 6,358 Customers
In a recent discovery, Check Point researchers have identified a ...
April 2025 Malware Spotlight: FakeUpdates Dominates as Multi-Stage Campaigns Blend Commodity Malware with Stealth
Cyber criminals are raising the stakes. This month, researchers uncovered ...