{"id":220,"date":"2024-03-05T12:42:42","date_gmt":"2024-03-05T12:42:42","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/03\/05\/warning-thread-hijacking-attack-targets-it-networks-stealing-ntlm-hashes\/"},"modified":"2024-03-05T12:42:42","modified_gmt":"2024-03-05T12:42:42","slug":"warning-thread-hijacking-attack-targets-it-networks-stealing-ntlm-hashes","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/03\/05\/warning-thread-hijacking-attack-targets-it-networks-stealing-ntlm-hashes\/","title":{"rendered":"Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes"},"content":{"rendered":"<p>\u200bThe threat actor known as\u00a0TA577\u00a0has been observed using ZIP archive attachments in phishing emails with an aim to steal NT LAN Manager (NTLM) hashes.<br \/>\nThe new attack chain \u201ccan be used for sensitive information gathering purposes and to enable follow-on activity,\u201d enterprise security firm Proofpoint\u00a0said\u00a0in a Monday report.<br \/>\nAt least two campaigns taking advantage of this\u00a0The threat actor known as\u00a0TA577\u00a0has been observed using ZIP archive attachments in phishing emails with an aim to steal NT LAN Manager (NTLM) hashes.<br \/>\nThe new attack chain \u201ccan be used for sensitive information gathering purposes and to enable follow-on activity,\u201d enterprise security firm Proofpoint\u00a0said\u00a0in a Monday report.<br \/>\nAt least two campaigns taking advantage of this\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThe threat actor known as\u00a0TA577\u00a0has been observed using ZIP archive attachments in phishing emails with an aim to steal NT LAN Manager (NTLM) hashes. The new attack chain \u201ccan be used for sensitive information gathering purposes and to enable follow-on activity,\u201d enterprise security firm Proofpoint\u00a0said\u00a0in a Monday report. At least two campaigns taking advantage of&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/03\/05\/warning-thread-hijacking-attack-targets-it-networks-stealing-ntlm-hashes\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":221,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/220"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=220"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/220\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/221"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}