A remote access Trojan or RAT is a malware program that provides a back door to gain administrative control over a computer or mobile device. RATs are usually downloaded invisibly via a user-requested program — such as an app or game — or sent as an email attachment. Once your system is compromised, the intruder may use it to distribute RATs to other vulnerable computers.
RATs Provide the Attacker with Greater Capabilities
- Key Logging: Your keystrokes can be monitored, and usernames, passwords, and other sensitive information like credit card and social security numbers can be recovered.
- Screen Capture: Screenshots can be obtained to see what’s going on your computer.
- Hardware Media Capture: RATs can gain access to your webcam and mic to record you and your surroundings completely violating privacy.
- Administration Rights: The attacker may change settings, modify registry values, format drives, delete, download or alter files and file systems.
- Other system-specific capabilities: Attackers can access anything on your computer, your files, passwords, chats – everything!
RATs can be difficult to detect because they usually don’t show up in lists of running programs or tasks and the actions they perform can be similar to those of legitimate programs. An intruder will often manage the level of resource use so that a drop in performance doesn’t alert you that something’s amiss.
Protect your devices from a Remote Access Trojan
- Keep antivirus software up to date.
- Refrain from downloading programs or opening attachments that aren’t from a trusted source.
- At the administrative level, block unused ports, turn off unused services and monitor outgoing traffic.