Remote access trojan
A Remote Access Trojan (RAT, sometimes called Creepware[1]) is a type of malware that controls a system through a remote network connection. While desktop sharing and remote administration have many legal uses, "RAT" connotes criminal or malicious activity. A RAT is typically installed without the victim's knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from security software and other anti-virus software.[2][3][4][5][6][7]
Notable examples
References
- ↑ "Creepware — Who's Watching You?". Symantec Security Response. 10 December 2013.
- ↑ "Remote Server Administration Tools for Windows 7". Microsoft Technet June 4, 2009. Retrieved 4 February 2011. ,
- ↑ "Danger: Remote Access Trojans". Microsoft technet September 2002. Retrieved 5 February 2011.
- ↑ "Understanding the Windows NT Remote Access Service". Microsoft technet date undisclosed. Retrieved 5 February 2011.
- ↑ "Netsh commands for remote access (ras)". Microsoft technet January 21, 2005. Retrieved 5 February 2011.
- ↑ "RAS Registry Modification Allowed Without Administrative Rights". Microsoft technet date undisclosed. Retrieved 5 February 2011.
- ↑ "Computer RATS - Protecting Your Self". HowTheyHack July 2013. Retrieved 17 July 2013.
- ↑ "Code Access Security and bifrost". Coding hooro.com Mar 20, 2007. Retrieved 5 February 2011.
- ↑ "BlackShades: Arrests in computer malware probe". BBC. Retrieved 20 May 2014.
- ↑ "Remarks Prepared for Delivery by Special Agent in Charge Leo Taddeo at Blackshades Press Conference". FBI. Retrieved 20 May 2014.
- ↑ Denbow, Shawn. "pest control: taming the rats" (PDF). Retrieved 5 March 2014.
- ↑ Aylward, Laura. "MALWARE ANALYSIS - DARK COMET RAT". Context. Retrieved 5 March 2014.
This article is issued from
Wikipedia.
The text is licensed under Creative Commons - Attribution - Sharealike.
Additional terms may apply for the media files.