Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels
Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that’s distributed via malicious Windows shortcut (LNK) files that are disguised as private key folders.
The CTRL toolkit, according to Censys, is custom-built using .NET and includes various executables” to facilitate credential phishing, keylogging, Remote Desktop Protocol (RDP) hijacking, and reverse tunneling
The post “Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels” appeared first on The Hacker News
Source:The Hacker News – [email protected] (The Hacker News)
