<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Netntlm — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/netntlm/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 18 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/netntlm/feed.xml" rel="self" type="application/rss+xml"/><item><title>NetNTLM Hash Phishing via Archive Extraction (CVE-2025-59284)</title><link>https://feed.craftedsignal.io/briefs/2026-03-netntlm-phishing/</link><pubDate>Wed, 18 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-netntlm-phishing/</guid><description>A phishing technique, potentially still viable due to incomplete patching, allows attackers to obtain NetNTLM hashes from archive extraction on Windows systems (CVE-2025-59284).</description><content:encoded>&lt;p>A vulnerability, tracked as CVE-2025-59284, enables attackers to capture NetNTLM hashes from Windows systems through a specially crafted archive file. This technique exploits how Windows handles file extraction, potentially forcing authentication requests to a malicious server controlled by the attacker. The vulnerability was presented at BsidesLjubljana in March 2026, suggesting recent active research and potential exploitation. The original Reddit post indicates that the Microsoft patch might…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>netntlm</category><category>phishing</category><category>windows</category></item></channel></rss>