Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Russian Toolkit Exploits RDP via Malicious LNK Files

Russian Toolkit Exploits RDP via Malicious LNK Files

Posted on March 30, 2026 By CWS

Cybersecurity experts have uncovered a sophisticated toolkit originating from Russia, which utilizes malicious Windows shortcut (LNK) files to compromise systems. These files, posing as private key folders, are part of a broader strategy to infiltrate and control targeted computers.

Mechanisms Behind the CTRL Toolkit

The CTRL toolkit, identified by researchers at Censys, is a bespoke creation developed using .NET technology. It encompasses various executable files designed for credential phishing, keylogging, and hijacking Remote Desktop Protocol (RDP) sessions, along with reverse tunneling through Fast Reverse Proxy (FRP). According to Censys security researcher Andrew Northern, the toolkit’s executables facilitate encrypted payload loading and credential harvesting via a deceptive Windows Hello interface.

Discovered on an open directory in February 2026, the toolkit’s distribution begins with a tampered LNK file named “Private Key #kfxm7p9q_yek.lnk,” which appears as a normal folder icon. This file initiates a complex sequence, ultimately deploying the malicious toolkit. The process starts with a hidden PowerShell command that eliminates existing persistence methods from the Windows Startup folder.

Technical Details and Attack Execution

The process includes decoding a Base64-encoded component, which executes in memory. The initial stage checks TCP connectivity to hui228[.]ru:7000 to download subsequent payloads. It also alters firewall configurations, establishes persistence through scheduled tasks, creates backdoor users, and initiates a command shell server accessible via FRP on port 5267.

One notable payload, “ctrl.exe,” acts as a .NET loader, launching additional embedded components. Depending on its command-line arguments, it functions as either a server or a client, with communication occurring through a Windows named pipe. This dual-mode operation allows attackers to interact with the victim’s system directly through an FRP-tunneled RDP session, while keeping command traffic confined to the local machine.

Implications and Future Outlook

The CTRL toolkit includes commands for gathering system information, activating a credential harvesting module, and initiating a keylogger to capture keystrokes. This information is stored in a file named “C:Tempkeylog.txt.” The credential harvesting tool mimics a Windows PIN verification prompt using Windows Presentation Foundation (WPF), making it difficult for users to detect the phishing attempt.

Furthermore, the toolkit can send fake browser notifications to steal additional credentials or deploy further payloads. Other components, such as FRPWrapper.exe and RDPWrapper.exe, facilitate reverse tunneling and enable multiple concurrent RDP sessions.

The design of the CTRL toolkit highlights a shift towards highly focused, single-operator tools that prioritize stealth and operational security. By utilizing FRP reverse tunnels, attackers can avoid the typical network signatures associated with standard remote access tools, making detection more challenging.

As cybersecurity threats continue to evolve, understanding and mitigating the risks associated with such sophisticated toolkits remain paramount for organizations worldwide.

The Hacker News Tags:credential phishing, CTRL toolkit, Cybersecurity, FRP tunnels, Keylogging, LNK files, Malware, network security, RDP hijack, Russian toolkit

Post navigation

Previous Post: Browser Extensions Pose AI Data Theft Risk
Next Post: Telnyx Python SDK Faces Supply Chain Attack

Related Posts

Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto The Hacker News
The Unusual Suspect: Git Repos The Unusual Suspect: Git Repos The Hacker News
Why Early Threat Detection Is a Must for Long-Term Business Growth Why Early Threat Detection Is a Must for Long-Term Business Growth The Hacker News
Cybersecurity Focus Risks Overlooking Basics Cybersecurity Focus Risks Overlooking Basics The Hacker News
New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks The Hacker News
New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark