- Mar 1, 2024
- 1,645
Windows devices use an older sign-in method called NTLM, which is enabled by default. In the event of a malware attack, it can expose your system password to hackers. They can use different kinds of man-in-the-middle attacks to steal your Windows login details. Luckily, you can protect your Windows NTLM credentials from zero day threats using a few simple tweaks in the NTLM settings.
How Windows NTLM Threats Steal Your Passwords
NTLM (NT LAN Manager) is an older authentication method still used on many Windows devices. It works by turning your password into a code (hash) to verify you without sending the password over the network. This is not secure because if your PC is compromised, your login password will be visible to attackers.
Recently in April 2025, security researcher Check Point blogged about NTLM hash disclosure through a vulnerability called “CVE-2025-24054.” According to them, it’s an ongoing cyberattack targeting government and enterprise users in Poland and Romania. Attackers are using different types of man-in-the-middle attacks, including pass-the-hash (PtH), rainbow table, and relay attacks. Their main target is privileged users or administrators.
While NTLM attacks often target enterprises and governments, home users are also vulnerable. Just interacting with a malicious file can leak your system password.
Microsoft did release a security patch for CVE-2025-24054. So it’s always good to keep your Windows system updated to prevent these attacks. Apart from that, there are a few other things you can do.

How to Protect Your Windows NTLM Credentials from Zero Day Threats - Make Tech Easier
Attackers may use zero-day attacks to steal your Windows NTLM credentials. You can prevent them through simple tweaks to your NTLM settings.
