Listen to this Post
A new and dangerous zero-day vulnerability has been discovered in Windows, allowing attackers to steal your NTLM credentials simply by viewing a malicious file in Windows Explorer. This means that attackers don’t even need to trick you into opening a file – just viewing it is enough to compromise your system.
What’s at Risk?
- NTLM Credentials Theft: Attackers can steal your login names and passwords, potentially leading to full system compromise.
- Wide-Ranging Impact: This vulnerability affects all Windows versions from Windows 7 to Windows 11 24H2 and Server 2022.
How to Protect Yourself:
- Disable NTLM Authentication: Use Group Policy to disable NTLM authentication on your Windows devices.
- Restrict NTLM Usage: Configure “Network security: Restrict NTLM” policies or adjust registry settings to limit NTLM exposure.

What to Do Next:
- Stay Informed: Keep an eye out for updates from Microsoft and other security vendors.
- Implement Mitigation: Take immediate action to protect your systems.
- Backup Your Data: Ensure you have regular backups of your important data.
Don’t Wait for a Patch:
Microsoft has not yet released an official patch for this vulnerability. By taking these mitigation steps now, you can significantly reduce the risk of a successful attack.
Spread the Word:
Share this information with your friends, family, and colleagues to help raise awareness about this critical vulnerability.

Stay Safe and Secure!
Disclaimer: This information is for educational purposes only. Please consult with a cybersecurity professional for specific guidance on protecting your systems.