# RATs (Remote Access
Trojans) are malicious destructive programs that run invisibly on victim PCs
and permit an intruder control remotely. Intruders usually bind Trojan horses
in games and other small programs that unsuspecting users then execute on their
PCs.
Exploited users either
download or then execute these upon tricked.
RATs come in # client and #
server components. Hackers launch the server program on a victim's machine by
binding the installing component to some other legitimate program. After
defining the server executable's behavior, the intruder generates the program,
tricking the host machine's owner into running it, where the hacker makes his
own computer the client side.
Side effects of Trojan
RATs can delete and modify files,
format hard disks, upload and download files and do a host of other activities.
First, the ability to capture
every screen and keystroke means that intruders can gather users' passwords,
directory paths, drive mappings, medical records, bank- account and credit card
information, and personal communications. If we have a WebCam, many RATs can
turn it on and capture videos! Popularly known as web-cam hacking.
Detecting and Removing RATs
A major challenge is
detection and removal of RATs. Typical antivirus scanners are less likely to
detect
RATs than worms or viruses
because of binders and intruder encryption routines. Also, RATs have the potential
to cause significantly more\ damage than a worm or virus can cause.
Apart from the fact that an
antivirus scanner can detect and delete these Trojans, its not fully
guaranteed.
Some of the popular softwares
to combat Trojans are –
#Malwarebytes Anti- malware ,
#SpyHunter and #Trojan Killer.
Also the most effective tip
is the fact that users should never click on suspicious documents from unknown
senders or download and extract any kind of email attachments without properly judging
the type of content it may have, as it is said Prevention is better than cure..
No comments:
Post a Comment