Cybersecurity researchers have made a disturbing discovery, uncovering a remote access toolkit of Russian origin that is being distributed through malicious Windows shortcut files, cleverly disguised as private key folders.

This custom-built toolkit, known as CTRL, has been analyzed by Censys and found to be constructed using .NET, incorporating various executables designed to facilitate a range of malicious activities.

These activities include credential phishing, keylogging, and most notably, the hijacking of Remote Desktop Protocol (RDP) connections, as well as the establishment of reverse tunnels.

The use of malicious LNK files as the delivery mechanism for the CTRL toolkit highlights the ongoing threat of social engineering tactics, where attackers rely on deception to trick victims into compromising their systems.

The specifics of the toolkit’s operation, including its ability to leverage reverse tunnels for communication, underscore the sophistication of the threat actors involved and the potential severity of the impacts on compromised systems.

As cybersecurity continues to evolve, the discovery of tools like the CTRL toolkit serves as a reminder of the importance of vigilance and the need for robust security measures to protect against such threats.

Source: Original Article