Illicit LNK files deploy Russian CTRL toolkit

Illicit LNK files deploy Russian CTRL toolkit The Hacker News reports that malicious Windows LNK files masquerading as private key folders have been tapped to facilitate the distribution of the CTRL toolkit that enables credential phishing, keylogging, RDP takeovers, and Fast Reverse Proxy-based reverse tunneling. 

Latest articles

Related articles