Mandiant releases rainbow table to crack NTLMv1 passwords

Security firm Mandiant has unveiled a rainbow table that enables cracking of administrative passwords protected by the outdated NTLMv1 hashing algorithm in under 12 hours using affordable hardware. The tool targets lingering use of this vulnerable protocol in sensitive networks. Mandiant hopes it will push organizations to abandon the deprecated function.

Security researchers at Mandiant have introduced a new resource to highlight the dangers of the long-deprecated NTLMv1 hashing algorithm. Released on January 16, 2026, the rainbow table is a precomputed database of hash values mapped to plaintext passwords. It allows recovery of Net-NTLMv1 protected credentials—used in network authentication for services like SMB file sharing—in less than 12 hours on consumer-grade hardware costing under $600. The table is hosted on Google Cloud and works against passwords generated with the known plaintext challenge 1122334455667788.

NTLMv1 dates back to the 1980s, introduced with Microsoft's OS/2 operating system. Its weaknesses were first exposed in 1999 by cryptanalyst Bruce Schneier and researcher Mudge. Microsoft addressed these flaws with NTLMv2 in 1998 via Windows NT SP4. Despite this, and a recent announcement in August 2025 to deprecate NTLMv1, the protocol persists in some critical sectors. Industries like healthcare and industrial control systems often stick with legacy applications incompatible with newer algorithms, compounded by migration costs and operational inertia.

"By releasing these tables, Mandiant aims to lower the barrier for security professionals to demonstrate the insecurity of Net-NTLMv1," the firm stated. Existing exploitation tools, such as Responder, PetitPotam, and DFSCoerce, can coerce Net-NTLMv1 hashes, but cracking them previously demanded significant resources or third-party services. Mandiant consultants still encounter NTLMv1 in active environments, leaving organizations open to easy credential theft.

Feedback from the security community has been positive. One infosec professional shared on Mastodon: "I’ve had more than one instance in my (admittedly short) infosec career where I’ve had to prove the weakness of a system and it usually involves me dropping a sheet of paper on their desk with their password on it the next morning. These rainbow tables aren’t going to mean much for attackers as they’ve likely already got them or have far better methods, but where it will help is in making the argument that NTLMv1 is unsafe."

Mandiant urges immediate disablement of Net-NTLMv1 and provides guidance on migration steps. The release serves as a wake-up call for laggards, emphasizing that continued use invites avoidable risks.

Articoli correlati

Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Immagine generata dall'IA

Russian hackers use Linux VMs to hide malware on Windows

Riportato dall'IA Immagine generata dall'IA

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Microsoft will disable the obsolete RC4 encryption cipher in Windows Active Directory by mid-2026, addressing decades of security vulnerabilities. The move follows criticism over its role in major hacks, including last year's Ascension breach affecting 140 hospitals. Administrators must now audit networks for lingering RC4 use.

Riportato dall'IA

A 2022 data breach at password manager LastPass has resulted in prolonged cryptocurrency thefts, according to blockchain intelligence firm TRM Labs. The incident involved stolen user vaults that facilitated around $35 million in losses extending into 2025.

A critical vulnerability in the TLP Linux power management tool has been fixed after researchers discovered it allowed local attackers to bypass authentication and alter system settings. The flaw, identified in version 1.9.0 and tracked as CVE-2025-67859, stemmed from a race condition in the Polkit mechanism. TLP developers released version 1.9.1 on January 7, 2026, addressing the issue following coordinated disclosure.

Riportato dall'IA

The era of cumbersome passwords may end in 2026, as passkeys emerge as a more secure alternative using biometrics. Cybersecurity experts predict widespread adoption, driven by major companies like Microsoft. This shift promises easier logins and reduced hacking risks.

Amazon Web Services has revealed a security flaw in its WorkSpaces client for Linux that allows local attackers to extract authentication tokens and access other users' virtual desktops. The vulnerability, CVE-2025-12779, affects client versions from 2023.0 to 2024.8 and carries a CVSS score of 8.8. AWS urges immediate upgrades to version 2025.0 or later to mitigate the risk.

Riportato dall'IA

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

 

 

 

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta