Overview
Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that's distributed via malicious Windows shortcut (LNK) files that are disguised as private key folders. The CTRL toolkit, according to Censys, is custom-built using .NET and includes various executables" to facilitate credential phishing, keylogging, Remote Desktop Protocol (RDP) hijacking, and reverse tunneling
Organisations Involved
The following organisations are mentioned in relation to this incident: Files Hijacks, Remote Desktop Protocol, Toolkit Delivered, Tunnels
Cybersecurity.
Multi-Source Coverage
This event has been reported across multiple outlets:
Sources: thehackernews. Aggregated by Cybernews Agency pipeline.