{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreieyk6a4evugbppi4vvbhfs6id6zzrk4a6go6dehwvcj5biiaovfhy",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3minsxnmbuar2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreihbj5wjlscrxhe7swzpwtgwp2kuvv52wrc3ggmfgzmtcojypjcqki"
    },
    "mimeType": "image/webp",
    "size": 22946
  },
  "path": "/russian-ctrl-toolkit-hijacks-rdp-sessions-and-steals-windows-credentials/",
  "publishedAt": "2026-04-03T16:53:01.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "Russian “CTRL” toolkit hijacks RDP sessions and steals Windows credentials",
    "VPN Central"
  ],
  "textContent": "A newly uncovered malware toolkit called “CTRL” gives attackers a quiet way to take over Windows systems, steal credentials, and keep long-term access. Security researchers at Censys ARC say the framework supports phishing, keylogging, RDP abuse, persistence, and reverse tunneling in one attack chain. The most serious risk comes from how the toolkit handles remote […]\n\nThe post Russian “CTRL” toolkit hijacks RDP sessions and steals Windows credentials appeared first on VPN Central.",
  "title": "Russian “CTRL” toolkit hijacks RDP sessions and steals Windows credentials"
}