The Birth and Rise of Remote Access Trojans (RATs)

The RATs themselves should consider using threat information to detect new digital threats and implement defenses and precautions. RATs play a prominent role in the execution of advanced persistent threats (APT).

Ensar Seker
CodeX

--

Example Gh0st RAT Attack Scenario — Source: https://link.springer.com/chapter/10.1007/978-3-030-38557-6_18

A Remote Access Trojan (RAT) is a type of malware that allows attackers to remotely control your system. It is an application that allows hackers to get in the door and have administrative access to a computer. Given that RAT is a malware program that tries to open a back door into a target computer system in order to gain administrative access.

Remote access Trojan is a program that provides features that enable covered monitoring and the ability to gain unauthorized access to a victim PC.

When a RAT reaches your computer it allows the attacker to access your local files, login credentials, other personal information, and sensitive information and use the connection to download viruses you have passed to others. Unlike malware that downloads programs requested by the user (such as games or e-mail attachments), most RATs leave no trace of their presence on the device. They can spy for long periods of time, meaning users can be infected for years without…

--

--

Ensar Seker
CodeX
Writer for

Cybersecurity | Artificial Intelligence | Blockchain