Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels

Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that’s distributed via malicious Windows shortcut (LNK) files that are disguised as private key folders.
The CTRL toolkit, according to Censys, is custom-built using .NET and includes various executables” to facilitate credential phishing, keylogging, Remote Desktop Protocol (RDP) hijacking, and reverse tunneling

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

Next Post

The State of Secrets Sprawl 2026: 9 Takeaways for CISOs

Related Posts
Total
0
Share