Legacy Windows communication protocols continue to expose organizations to credential theft, even without exploiting software vulnerabilities, a new cybersecurity study by Resecurity found.
The research warned that attackers can capture login data simply by being on the same local network as their targets, using protocols such as Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS).
These protocols trust any device that responds to their requests – an oversight that allows attackers to impersonate legitimate systems.
Author's summary: Legacy Windows protocols expose organizations to credential theft.