Remote access trojan

A Remote Access Trojan (RAT, sometimes called Creepware[1]) is a type of malware that controls a system through a remote network connection. While desktop sharing and remote administration have many legal uses, "RAT" connotes criminal or malicious activity. A RAT is typically installed without the victim's knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from security software and other anti-virus software.[2][3][4][5][6][7]

Notable examples

  1. Back Orifice
  2. NetBus
  3. PoisonIvy
  4. Sub Seven
  5. Beast Trojan
  6. Bifrost[8]
  7. Blackshades[9][10]
  8. DarkComet[11][12]

References

  1. "Creepware — Who's Watching You?". Symantec Security Response. 10 December 2013.
  2. "Remote Server Administration Tools for Windows 7". Microsoft Technet June 4, 2009. Retrieved 4 February 2011. ,
  3. "Danger: Remote Access Trojans". Microsoft technet September 2002. Retrieved 5 February 2011.
  4. "Understanding the Windows NT Remote Access Service". Microsoft technet date undisclosed. Retrieved 5 February 2011.
  5. "Netsh commands for remote access (ras)". Microsoft technet January 21, 2005. Retrieved 5 February 2011.
  6. "RAS Registry Modification Allowed Without Administrative Rights". Microsoft technet date undisclosed. Retrieved 5 February 2011.
  7. "Computer RATS - Protecting Your Self". HowTheyHack July 2013. Retrieved 17 July 2013.
  8. "Code Access Security and bifrost". Coding hooro.com Mar 20, 2007. Retrieved 5 February 2011.
  9. "BlackShades: Arrests in computer malware probe". BBC. Retrieved 20 May 2014.
  10. "Remarks Prepared for Delivery by Special Agent in Charge Leo Taddeo at Blackshades Press Conference". FBI. Retrieved 20 May 2014.
  11. Denbow, Shawn. "pest control: taming the rats" (PDF). Retrieved 5 March 2014.
  12. Aylward, Laura. "MALWARE ANALYSIS - DARK COMET RAT". Context. Retrieved 5 March 2014.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.