{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreig7vj75fdx2jvw3rmmu4hujtxvixooxgp4o5jy67jauhoobcv6csu",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mic6j3t73jy2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiads3hkhjakcstwzylz3ocowca374ah2b2xdbof3mti3i54azc3re"
},
"mimeType": "image/jpeg",
"size": 527522
},
"path": "/2026/03/russian-ctrl-toolkit-delivered-via.html",
"publishedAt": "2026-03-30T12:18:00.000Z",
"site": "https://thehackernews.com",
"textContent": "Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that's distributed via malicious Windows shortcut (LNK) files that are disguised as private key folders.\nThe CTRL toolkit, according to Censys, is custom-built using .NET and includes various executables\" to facilitate credential phishing, keylogging, Remote Desktop Protocol (RDP) hijacking, and reverse tunneling",
"title": "Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels"
}