Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Russian Toolkit Exploits RDP via Malicious LNK Files

Russian Toolkit Exploits RDP via Malicious LNK Files

Posted on March 30, 2026 By CWS

Cybersecurity experts have uncovered a sophisticated toolkit originating from Russia, which utilizes malicious Windows shortcut (LNK) files to compromise systems. These files, posing as private key folders, are part of a broader strategy to infiltrate and control targeted computers.

Mechanisms Behind the CTRL Toolkit

The CTRL toolkit, identified by researchers at Censys, is a bespoke creation developed using .NET technology. It encompasses various executable files designed for credential phishing, keylogging, and hijacking Remote Desktop Protocol (RDP) sessions, along with reverse tunneling through Fast Reverse Proxy (FRP). According to Censys security researcher Andrew Northern, the toolkit’s executables facilitate encrypted payload loading and credential harvesting via a deceptive Windows Hello interface.

Discovered on an open directory in February 2026, the toolkit’s distribution begins with a tampered LNK file named “Private Key #kfxm7p9q_yek.lnk,” which appears as a normal folder icon. This file initiates a complex sequence, ultimately deploying the malicious toolkit. The process starts with a hidden PowerShell command that eliminates existing persistence methods from the Windows Startup folder.

Technical Details and Attack Execution

The process includes decoding a Base64-encoded component, which executes in memory. The initial stage checks TCP connectivity to hui228[.]ru:7000 to download subsequent payloads. It also alters firewall configurations, establishes persistence through scheduled tasks, creates backdoor users, and initiates a command shell server accessible via FRP on port 5267.

One notable payload, “ctrl.exe,” acts as a .NET loader, launching additional embedded components. Depending on its command-line arguments, it functions as either a server or a client, with communication occurring through a Windows named pipe. This dual-mode operation allows attackers to interact with the victim’s system directly through an FRP-tunneled RDP session, while keeping command traffic confined to the local machine.

Implications and Future Outlook

The CTRL toolkit includes commands for gathering system information, activating a credential harvesting module, and initiating a keylogger to capture keystrokes. This information is stored in a file named “C:Tempkeylog.txt.” The credential harvesting tool mimics a Windows PIN verification prompt using Windows Presentation Foundation (WPF), making it difficult for users to detect the phishing attempt.

Furthermore, the toolkit can send fake browser notifications to steal additional credentials or deploy further payloads. Other components, such as FRPWrapper.exe and RDPWrapper.exe, facilitate reverse tunneling and enable multiple concurrent RDP sessions.

The design of the CTRL toolkit highlights a shift towards highly focused, single-operator tools that prioritize stealth and operational security. By utilizing FRP reverse tunnels, attackers can avoid the typical network signatures associated with standard remote access tools, making detection more challenging.

As cybersecurity threats continue to evolve, understanding and mitigating the risks associated with such sophisticated toolkits remain paramount for organizations worldwide.

The Hacker News Tags:credential phishing, CTRL toolkit, Cybersecurity, FRP tunnels, Keylogging, LNK files, Malware, network security, RDP hijack, Russian toolkit

Post navigation

Previous Post: Browser Extensions Pose AI Data Theft Risk
Next Post: Telnyx Python SDK Faces Supply Chain Attack

Related Posts

New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper The Hacker News
UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats The Hacker News
APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains The Hacker News
Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents The Hacker News
New Browser Security Report Reveals Emerging Threats for Enterprises New Browser Security Report Reveals Emerging Threats for Enterprises The Hacker News
Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark