Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Legacy Windows Protocols Still Expose Networks to Credential Theft
News

Legacy Windows Protocols Still Expose Networks to Credential Theft

Team-CWDBy Team-CWDOctober 14, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new cybersecurity study has found that legacy Windows communication protocols continue to expose organizations to credential theft, even without exploiting software vulnerabilities.

The research, published today by Resecurity, warned that attackers can capture login data simply by being on the same local network as their targets.

Legacy Features Still in Use

Link-Local Multicast Name Resolution (LLMNR) and its predecessor, NetBIOS Name Service (NBT-NS), were designed to help Windows systems find other devices when DNS lookups fail. However, these protocols trust any device that responds to their requests – an oversight that allows attackers to impersonate legitimate systems.

By using tools such as Responder, a hacker can intercept these broadcasts and trick a victim machine into sending authentication data. The attacker then captures information including usernames, domain details and encrypted password hashes.

“This attack does not rely on exploiting a software vulnerability,” the study said.

“It takes advantage of default Windows behavior and only requires the attacker to be present on the same local network segment as the victim.”

Read more on authentication risks: Identity Risk Management: Locking Down Ephemeral Accounts

Growing Concern For Organizations

Once stolen, the captured data can be cracked offline or reused in what’s known as a relay attack. This can provide direct access to corporate databases, file servers or administrative systems. In some cases, attackers may obtain passwords in cleartext, gaining immediate entry to sensitive data.

Researchers warned that the consequences extend well beyond a single compromised device. Once attackers obtain valid credentials, they can move laterally across the network, accessing additional systems and resources.

From there, they may escalate privileges by targeting high-value accounts such as administrators or service users, gaining broader control over the environment.

This kind of access can lead to widespread data exposure, unauthorized changes to systems and even the disruption of critical business services or operational downtime. In large organizations, the impact can ripple across departments, making containment and recovery more complex.

Recommended Fixes

The study outlined several ways to mitigate the risk. Organizations are urged to:

  • Disable LLMNR and NBT-NS through Group Policy

  • Block UDP port 5355 to prevent multicast queries

  • Enforce SMB signing and reduce NTLM authentication

  • Maintain accurate DNS configurations to avoid fallback lookups

Security teams are also encouraged to monitor for unusual traffic on these protocols, which may indicate active exploitation attempts.

According to the report, LLMNR and NBT-NS poisoning remains one of the most common (and preventable) network attacks.

“The most effective defense is to eliminate reliance on these legacy protocols by disabling LLMNR and NBT-NS, enforcing secure authentication methods such as Kerberos and ensuring DNS infrastructure is properly configured,” Resecurity said.

“Combined with network monitoring and credential-hardening practices, these measures significantly reduce the risk of credential theft through broadcast poisoning attacks.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article5 Critical Questions For Adopting an AI Security Solution
Next Article New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

When ‘hacking’ your game becomes a security risk

October 17, 2025

Find your weak spots before attackers do

November 21, 2025

How the always-on generation can level up their cybersecurity game

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.