An attack known as Pass the Hash has been targeting Windows machines since the days of Windows 3.11, but Colombian security researcher Juan Diego recently discovered that a threat actor could easily obtain NT LAN Manager (NTLM) password hashes without any user intervention.

How the Attack Works

The attack itself is rather simple: A Shell Command File (SCF) is placed in a public folder with no password protection. These are plaintext files that instruct Windows File Explorer to execute basic tasks.

For some reason, the SCF file is executed as soon as it is placed in the folder. It then sucks up the NTLM password hash and sends it to the attacker’s server. At that point, the threat actor can decrypt the hash and the password to gain access to the victim’s machine.

“This [attack] is automatic. The underlying issue triggering this is still unknown to me. [Microsoft] has been very secretive about that,” Diego told Bleeping Computer.

This is a departure from previous exploits, which began only after the victim had accessed the poisoned folder. One recent attack combined a Chrome extension with SCF files to gain a user’s credentials.

Protecting NTLM Passwords

The Pass the Hash attack arose from the automatic sharing of NTLM hashes with servers that are located outside of the original network. This is a long-standing architectural flaw in Windows that Microsoft has been reluctant to discuss or fix.

The technology giant did issue an optional patch (ADV170014) that disables the scheme by changing two registry keys and prevents fraudsters from duping users into authenticating on servers outside their local network. However, the fix only works on Windows 10 and Windows Server 2016, and Microsoft has not announced any plans to extend the patch to previous versions.

A simpler solution is to use password-protected public folders. The benefit of avoiding this type of attack far outweighs the slight inconvenience of having to enter a password to gain access.

More from

How Do Some Companies Get Compromised Again and Again?

3 min read - Hack me once, shame on thee. Hack me twice, shame on me. The popular email marketing company, MailChimp, suffered a data breach last year after cyberattackers exploited an internal company tool to gain access to customer accounts. The criminals were able to look at around 300 accounts and exfiltrate data on 102 customers. They also accessed some customers’ AIP keys, which would have enabled them to send email campaigns posing as those customers. This data breach attack wasn’t especially noteworthy…

3 min read

Going Up! How to Handle Rising Cybersecurity Costs

4 min read - The average cost of cybersecurity systems, solutions and staff is increasing. As noted by research firm Gartner, companies will spend 11% more in 2023 than they did in 2022 to effectively handle security and risk management. This puts companies in a challenging position: If spending stays the same, IT environments are at risk. If they budget more for cybersecurity, funding for other projects may fall through. The result? Businesses must balance rising cybersecurity costs with finite budget resources. What’s Driving…

4 min read

Proven Methods to Prevent Human-Based Security Mistakes

4 min read - The most recent Verizon Data Breach Investigations Report reveals the human element continues to be a key driver of 82% of breaches, including social attacks, errors and misuse. Undoubtedly, human error generates massive security headaches. Meanwhile, the rate and cost of cyber breaches continue to climb. Why is it then that over half of employed people don’t have or don’t use security awareness training? Maybe security teams don’t believe in security training. Or maybe they don’t know exactly what kind…

4 min read

CISA’s Known Vulnerabilities Impact 15M Public Services

4 min read - CISA’s Known Exploited Vulnerabilities (KEV) catalog is the authoritative source of information on past or currently exploited vulnerabilities. In a new report, the Rezilion research team analyzed vulnerabilities in the current KEV catalog. The results revealed a whopping 15 million vulnerable instances. And the majority of the occurrences were Microsoft Windows instances. Rezilion notes that KEV catalog vulnerabilities are frequent targets of advanced persistent threat (APT) Groups. And this wide-open attack surface remains unaddressed largely due to a lack of…

4 min read