What is Remote Access Trojan (RAT)

advertise here
A remote access Trojan (RAT) is a is a malware program that includes a back door for administrative control over the target computer to remotely access or control a computer for the purpose of performing various malicious activities. The RAT gives the user access to your system, just as if they had physical access to your device.  Hackers can install malicious RAT software on a computer without the user's knowledge and take control of it remotely without the user's knowledge. RATs can be installed by opening an infected attachment, clicking links in a popup window, or through any other software that poses as legitimate. '

RAT can also be called as a synonym for a backdoor, which includes a client and server program. The server or the stub program, if installed in the compromised system unknowingly by the owner of that system, then it is called as a Remote Access Trojan.

How you can avoid remote access Trojan (RAT)


  • Be careful what links you click and what you download. Often times RATs are installed unknowingly by you after you’ve opened an email attachment or visited a software in the background.
  • Beware of P2P file-sharing. Not only is a lot the content in these files pirated, criminals love to sneak in a few malware surprises in there too.
  • Use comprehensive security software on all your devices. Make sure you install a security suite service, which protects your data and identity on all your PCs, Macs, tablets and smartphones.

Some Popular remote access Trojan (RAT)

  • The Back Orifice rootkit is one of the best-known examples of a RAT. A hacker group known as the Cult of the Dead Cow created Back Orifice to expose the security deficiencies of Microsoft's Windows operating systems.
  •  BO2K is a client/server application that can remotely control an information processing application with a fixed IP (Internet Protocol) address by hiding its presence from the victim machine. After its installation, BO2K gathers information, performs system commands, reconfigures machines, and redirects network traffic to unauthorized services.

RATs can be difficult to detect because they usually don't show up in lists of running programs or tasks. The actions they perform can be similar to those of legitimate programs. 
Advertisement