A Remote Access Trojan (RAT) is malware that includes a backdoor for administrative control over the target computer. These trojans are typically installed in the background, invisibly, with a user-requested program such as a video game or an opened email attachment. These programs leverage the exact same remote access technology that Managed Service Providers use to remote into a particular machine to provide support. The only difference being a RAT does not have permission to be there and the targeted computer owner is unaware (usually) of the hacker’s presence until a critical event occurs such as a Ransomware attack that encrypts all of your files to extort a bitcoin ransom payment from you.
The same way you protect against all other Malware. Train your employees on phishing attacks which account for 90% of network breaches at small to medium sized companies.
Patch your systems regularly to keep them up-to-date and partially mitigate the threat of drive-by-downloads being successful at infecting a computer via a malicious website.
Related Terms: Trojan Horse, Malware
Source: TechTarget
https://youtube.com/watch?v=vY8iHRfCgYQ
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...
Read more
The rapid rise of generative AI has unlocked enormous promise, but it’s also accelerating the arms race in...
Read more
Newly discovered Android banking Remote Access Trojan (RAT), dubbed Klopatra, has compromised more than 3,000...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
