Login

Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels

thumbnail
ctrl-ctrl.jpg

Asset Info

CreatorN/A
Registration TimeLoading...
RegistrarThe Hacker News
Capture TimeLoading...
GeolocationN/A
File TypeJPEG
Source TypedigitalUpload

Details

Abstract
Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that's distributed via malicious Windows shortcut (LNK) files that are disguised as private key folders. The CTRL toolkit, according to Censys, is custom-built using .NET and includes various executables" to facilitate credential phishing, keylogging, Remote Desktop Protocol (RDP) hijacking, and reverse tunneling
LicenseN/A
Mining PreferenceN/A
Integrity Proof