Mandiant releases rainbow table to crack NTLMv1 passwords

Security firm Mandiant has unveiled a rainbow table that enables cracking of administrative passwords protected by the outdated NTLMv1 hashing algorithm in under 12 hours using affordable hardware. The tool targets lingering use of this vulnerable protocol in sensitive networks. Mandiant hopes it will push organizations to abandon the deprecated function.

Security researchers at Mandiant have introduced a new resource to highlight the dangers of the long-deprecated NTLMv1 hashing algorithm. Released on January 16, 2026, the rainbow table is a precomputed database of hash values mapped to plaintext passwords. It allows recovery of Net-NTLMv1 protected credentials—used in network authentication for services like SMB file sharing—in less than 12 hours on consumer-grade hardware costing under $600. The table is hosted on Google Cloud and works against passwords generated with the known plaintext challenge 1122334455667788.

NTLMv1 dates back to the 1980s, introduced with Microsoft's OS/2 operating system. Its weaknesses were first exposed in 1999 by cryptanalyst Bruce Schneier and researcher Mudge. Microsoft addressed these flaws with NTLMv2 in 1998 via Windows NT SP4. Despite this, and a recent announcement in August 2025 to deprecate NTLMv1, the protocol persists in some critical sectors. Industries like healthcare and industrial control systems often stick with legacy applications incompatible with newer algorithms, compounded by migration costs and operational inertia.

"By releasing these tables, Mandiant aims to lower the barrier for security professionals to demonstrate the insecurity of Net-NTLMv1," the firm stated. Existing exploitation tools, such as Responder, PetitPotam, and DFSCoerce, can coerce Net-NTLMv1 hashes, but cracking them previously demanded significant resources or third-party services. Mandiant consultants still encounter NTLMv1 in active environments, leaving organizations open to easy credential theft.

Feedback from the security community has been positive. One infosec professional shared on Mastodon: "I’ve had more than one instance in my (admittedly short) infosec career where I’ve had to prove the weakness of a system and it usually involves me dropping a sheet of paper on their desk with their password on it the next morning. These rainbow tables aren’t going to mean much for attackers as they’ve likely already got them or have far better methods, but where it will help is in making the argument that NTLMv1 is unsafe."

Mandiant urges immediate disablement of Net-NTLMv1 and provides guidance on migration steps. The release serves as a wake-up call for laggards, emphasizing that continued use invites avoidable risks.

Relaterede artikler

Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Billede genereret af AI

Russian hackers use Linux VMs to hide malware on Windows

Rapporteret af AI Billede genereret af AI

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Microsoft will disable the obsolete RC4 encryption cipher in Windows Active Directory by mid-2026, addressing decades of security vulnerabilities. The move follows criticism over its role in major hacks, including last year's Ascension breach affecting 140 hospitals. Administrators must now audit networks for lingering RC4 use.

Rapporteret af AI

New research from ETH Zurich and USI Lugano reveals vulnerabilities in popular password managers, challenging their assurances that servers cannot access user vaults. The study analyzed Bitwarden, Dashlane, and LastPass, identifying ways attackers with server control could steal or modify data, particularly when features like account recovery or sharing are enabled. Companies have begun patching the issues while defending their overall security practices.

Following the 2022 LastPass data breach, blockchain firm TRM Labs has tied over $35 million in stolen cryptocurrency to Russian cybercriminals, detailing sophisticated laundering via mixers and exchanges persisting into late 2025.

Rapporteret af AI

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

The Hacker News has released its latest ThreatsDay Bulletin, focusing on various cybersecurity issues. The bulletin covers topics such as Kali Linux combined with Claude, Chrome crash traps, WinRAR flaws, and activities related to LockBit. It also includes over 15 additional stories on emerging threats.

Rapporteret af AI

A notorious group of Russian cybercriminals has resurfaced with a new ransomware variant. However, security experts note that files encrypted by this malware can be easily decrypted.

 

 

 

Dette websted bruger cookies

Vi bruger cookies til analyse for at forbedre vores side. Læs vores privatlivspolitik for mere information.
Afvis