Remote Access Trojan (RAT)

13th January 2020 | Cybrary Remote Access Trojan (RAT)


https://hackersterminal.com/what-is-remote-access-trojan/

A Remote Access Trojan (RAT) is malware that includes a backdoor for administrative control over the target computer. These trojans are typically installed in the background, invisibly, with a user-requested program such as a video game or an opened email attachment.  These programs leverage the exact same remote access technology that Managed Service Providers use to remote into a particular machine to provide support.  The only difference being a RAT does not have permission to be there and the targeted computer owner is unaware (usually) of the hacker’s presence until a critical event occurs such as a Ransomware attack that encrypts all of your files to extort a bitcoin ransom payment from you.

How do SMB’s protect against RAT’s?

The same way you protect against all other Malware.  Train your employees on phishing attacks which account for 90% of network breaches at small to medium sized companies.

Patch your systems regularly to keep them up-to-date and partially mitigate the threat of drive-by-downloads being successful at infecting a computer via a malicious website.

Related Terms: Trojan HorseMalware

Source: TechTarget

To learn more about RATs please watch this video.

https://youtube.com/watch?v=vY8iHRfCgYQ

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

That DocuSign Email Probably Isn’t From DocuSign

That DocuSign Email Probably Isn’t From DocuSign

Your inbox sees dozens of emails every day that look completely routine. A DocuSign notification fits right in. A...

Read more
PromptSpy: The Android Malware That Hired an AI Assistant

PromptSpy: The Android Malware That Hired an AI Assistant

And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....

Read more
Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more