Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Designing electric motors to reduce environmental impact

Russian CTRL toolkit delivered via malicious LNK file hijacks RDP via FRP tunnel

Decarbonizing multifamily housing: the solution is here

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russian CTRL toolkit delivered via malicious LNK file hijacks RDP via FRP tunnel
Identity

Russian CTRL toolkit delivered via malicious LNK file hijacks RDP via FRP tunnel

By March 30, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 30, 2026Malware/Network Security

Cybersecurity researchers have discovered a Russian-originated remote access toolkit distributed via malicious Windows Shortcuts (LNK) files disguised as private key folders.

According to Censys, the CTRL toolkit is custom-built using .NET and includes a variety of executables that facilitate credential phishing, keylogging, Remote Desktop Protocol (RDP) hijacking, and reverse tunneling through Fast Reverse Proxy (FRP).

“These executables load encrypted payloads, harvest credentials through a sophisticated Windows Hello phishing UI, provide keylogging, RDP session hijacking, and reverse proxy tunneling through FRP,” said Censys security researcher Andrew Northern.

The attack surface management platform announced that it has recovered CTRL from Open Directory at 146.19.213.[.]The attack chain distributing the toolkit relies on a weaponized LNK file (“Private Key #kfxm7p9q_yek.lnk”) containing a folder icon that tricks users into double-clicking it.

This triggers a multi-step process where each step decrypts or decompresses the next step, all the way to toolkit deployment. The LNK file dropper is designed to launch hidden PowerShell commands that erase any existing persistence mechanisms from the victim’s Windows startup folder.

It also decodes Base64 encoded BLOBs and executes them in memory. The stager tests TCP connectivity to hui228.[.]Run ru:7000 to download the next stage payload from the server. Additionally, it modifies firewall rules, sets persistence using scheduled tasks, creates a backdoor local user, and spawns a cmd.exe shell server on port 5267 that can be accessed through the FRP tunnel.

One of the downloaded payloads, ‘ctrl.exe’, acts as a .NET loader to launch the embedded payload, the CTRL management platform. The CTRL management platform can act as a server or client depending on the command line arguments. Communication takes place via Windows Named Pipes.

“The dual-mode design means that the operator deploys ctrl.exe once to the victim (via the stager) and then interacts with the victim by running the ctrl.exe client through an FRP-tunneled RDP session,” Censys said. “The named pipes architecture keeps all C2 command traffic local to the victim machine; nothing traverses the network except for the RDP session itself.”

The supported commands allow the malware to collect system information, launch modules designed for credential collection, launch the keylogger as a background service (if configured as a server), and install keyboard hooks to capture all keystrokes to a file named “C:\Temp\keylog.txt” and extract the results.

The credential capture component is launched as a Windows Presentation Foundation (WPF) application that mimics a real Windows PIN validation prompt to capture the system PIN. In addition to blocking attempts to escape phishing windows using keyboard shortcuts such as Alt+Tab, Alt+F4, or F4, this module also validates the entered PIN against the actual Windows credential prompt via UI automation using the SendKeys() method.

“If the PIN is rejected, the victim is looped back and shown an error message,” Northern explained. “The window remains open even if the PIN is successfully validated against the real Windows Authenticator. The captured PIN is recorded with the prefix.” [STEALUSER PIN CAPTURED] Copy to the same keylog file used by the background keylogger. ”

One of the commands included in the toolkit can be used to impersonate web browsers such as Google Chrome, Microsoft Edge, Brave, Opera, Opera GX, Vivaldi, Yandex, and Iron to send toast notifications to perform additional credential theft or deliver other payloads. The other two payloads dropped as part of the attack are:

FRPWrapper.exe. This is a Go DLL that is loaded into memory to establish an RDP and raw TCP shell reverse tunnel through the operator’s FRP server. RDPWrapper.exe: Enables unlimited concurrent RDP sessions.

“This toolkit demonstrates intentional operational security; the three hosted binaries do not contain hard-coded C2 addresses,” Censys said. “All data exfiltration is done through an FRP tunnel via RDP. The operator connects to the victim’s desktop and reads the keylog data through a ctrl named pipe. This architecture leaves minimal network forensic artifacts compared to the traditional C2 beacon pattern.”

“The CTRL toolkit represents a trend toward purpose-built, single-operator toolkits that prioritize operational security over breadth of functionality. By routing all interactions to RDP sessions over FRP reverse tunnels, operators avoid the network-detectable beacon patterns that are characteristic of commodity RATs.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDecarbonizing multifamily housing: the solution is here
Next Article Designing electric motors to reduce environmental impact

Related Posts

Three China-linked clusters target Southeast Asian governments in 2025 cyberattacks

March 30, 2026

Iran-linked hacker compromises FBI director’s personal email and attacks Stryker with wiper attack

March 28, 2026

Citrix NetScaler memory overread bug under active investigation for CVE-2026-3055 (CVSS 9.3)

March 28, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Designing electric motors to reduce environmental impact

Russian CTRL toolkit delivered via malicious LNK file hijacks RDP via FRP tunnel

Decarbonizing multifamily housing: the solution is here

Europe’s path to energy independence begins with clean heating

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.