Russian Hackers Exploit CTRL Toolkit for RDP Hijacking

Basically, Russian hackers are using a new tool to take control of computers remotely and steal passwords.
Russian hackers are leveraging a new malware toolkit called CTRL to hijack RDP sessions and steal credentials. This poses a serious risk to organizations using remote access. Stay informed and protect your systems against this evolving threat.
What Happened
A newly identified remote access toolkit named CTRL is being used by Russian hackers to hijack Remote Desktop Protocol (RDP) sessions. This malware, discovered by Censys ARC, utilizes a custom .NET framework that integrates various attack techniques including phishing, keylogging, and reverse tunneling. The toolkit was found during an open directory scan, where researchers uncovered a malicious LNK file and several .NET payloads linked to the domain hui228[.]ru.
The CTRL toolkit is notable for its sophisticated design, specifically tailored for modern Windows systems. This indicates that the malware is actively being developed and refined. The initial attack vector involves a weaponized shortcut file disguised as a folder, which, when opened, executes hidden PowerShell code to load the malware into memory without leaving obvious traces.
Who's Being Targeted
Organizations that rely on RDP for remote access are particularly vulnerable to this attack. The malware allows attackers to gain unauthorized access to Windows systems, enabling them to steal sensitive credentials and maintain long-term access. The Censys ARC report highlights that the toolkit has not been widely distributed, suggesting it may be used selectively against high-value targets.
The operation is linked to a Russian-speaking developer, as indicated by the presence of Russian-language strings and specific development artifacts. This connection raises concerns about the potential for state-sponsored cyber espionage, as the toolkit's capabilities align with the tactics used in advanced persistent threat (APT) operations.
Signs of Infection
Once installed, CTRL provides attackers with hidden RDP access. It modifies the termsrv.dll file and installs RDP Wrapper, enabling concurrent remote desktop sessions without alerting the victim. Additionally, the malware includes a fake Windows Hello PIN prompt that mimics the real interface, tricking users into entering their credentials.
The toolkit also features a background keylogger and utilizes a named pipe for command execution, allowing attackers to control the infected system through the compromised RDP session. This stealthy approach minimizes network visibility, as the malware employs Fast Reverse Proxy (FRP) to establish reverse tunnels back to the attacker's infrastructure, avoiding traditional command-and-control patterns.
How to Protect Yourself
To defend against this sophisticated malware, organizations should monitor for unusual activities, such as unexpected scheduled tasks or registry modifications related to Explorer. Key indicators of compromise include:
- Malicious registry entries in HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer.
- Suspicious files like C:\Temp\keylog.txt for keystroke logs.
- Outbound traffic to the identified IPs and domain.
Security teams should also implement strict access controls for RDP, regularly update systems, and educate users about phishing tactics. By staying vigilant and proactive, organizations can mitigate the risks associated with the CTRL malware and protect their sensitive information.