Remote Access Trojan (RAT)

13th January 2020 | Cybrary Remote Access Trojan (RAT)


https://hackersterminal.com/what-is-remote-access-trojan/

A Remote Access Trojan (RAT) is malware that includes a backdoor for administrative control over the target computer. These trojans are typically installed in the background, invisibly, with a user-requested program such as a video game or an opened email attachment.  These programs leverage the exact same remote access technology that Managed Service Providers use to remote into a particular machine to provide support.  The only difference being a RAT does not have permission to be there and the targeted computer owner is unaware (usually) of the hacker’s presence until a critical event occurs such as a Ransomware attack that encrypts all of your files to extort a bitcoin ransom payment from you.

How do SMB’s protect against RAT’s?

The same way you protect against all other Malware.  Train your employees on phishing attacks which account for 90% of network breaches at small to medium sized companies.

Patch your systems regularly to keep them up-to-date and partially mitigate the threat of drive-by-downloads being successful at infecting a computer via a malicious website.

Related Terms: Trojan HorseMalware

Source: TechTarget

To learn more about RATs please watch this video.

https://youtube.com/watch?v=vY8iHRfCgYQ

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Cybersecurity Leader Uploads Sensitive Files to AI

Cybersecurity Leader Uploads Sensitive Files to AI

Not surprising when Trouble Ensues Last summer, the interim head of a major U.S. cybersecurity agency uploaded...

Read more
Common Google Workspace Security Gaps

Common Google Workspace Security Gaps

And How to Fix Them Let me make an educated guess. You moved to Google Workspace because it was supposed to...

Read more
MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

Remember Heartbleed? That security nightmare from a few years back that made everyone panic about their...

Read more