New phishing campaign · NTLMv2 hash capture
Active campaign across europäische Organisationen exploiting forced authentication via legacy protocols. Emails relay the Net-NTLMv2 hash to threat actor infrastructure with no user interaction required — automatic email client preview is enough.