Difference between revisions of "Remote Access Trojan (RAT)"
Jump to navigation
Jump to search
(Created page with "Remote Access Trojan") Tags: Mobile web edit, Mobile edit |
Tags: Mobile web edit, Mobile edit |
||
(4 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
− | Remote Access [[Trojan]] | + | Remote Access [[Trojan]] (RAT) is a malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program, such as a game or sent as an email attachment. |
+ | |||
+ | This backdoor into the target machine can allow an attacker unfettered access, including the ability to monitor user behavior, change computer settings, browse and copy files, access connected systems, and more. | ||
+ | |||
+ | It is not uncommon to find RAT packages that have been modified for a specific use, such as the program used in the Ukraine electric grid attack in 2015. | ||
+ | |||
+ | |||
+ | == Related terms == | ||
+ | * [[Antivirus]] | ||
+ | |||
+ | ==See also== | ||
+ | *{{Security}} | ||
+ | |||
+ | |||
+ | [[Category:Security]] |
Latest revision as of 06:33, 6 September 2020
Remote Access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program, such as a game or sent as an email attachment.
This backdoor into the target machine can allow an attacker unfettered access, including the ability to monitor user behavior, change computer settings, browse and copy files, access connected systems, and more.
It is not uncommon to find RAT packages that have been modified for a specific use, such as the program used in the Ukraine electric grid attack in 2015.
Related terms[edit]
See also[edit]
- Security: Security portfolio, Security standards, Hardening, CVE, CWE, Wireless Network Hacking, vulnerability scanner, Security risk assessment, SCA, Application Security Testing, OWASP, Data leak, NIST, SANS, MITRE, Security policy, Access Control attacks, password policy, password cracking, Password manager, MFA, OTP, UTF, Firewall, DoS, Software bugs, MITM, Certified Ethical Hacker (CEH) Contents, Security+ Malware, FIPS, DLP, Network Access Control (NAC), VAPT, SIEM, EDR, SOC, pentest, PTaaS, Clickjacking, MobSF, Janus vulnerability, Back Orifice, Backdoor, CSO, CSPM, PoLP, forensic, encryption, Keylogger, Pwn2Own, CISO, Prototype pollution
Advertising: