A remote access trojan (RAT) is a type of trojan viruses designed to grant an attacker remote control over an infected computer. Once the RAT is running on the computer, the operator can send it commands to collect data or perform other malicious actions. Some RATs are designed to be modular software, allowing them to offer a wide range of capabilities, and to download other malware to the system.
RATs are dangerous because they’re commonly used to provide the attacker with an initial foothold on an infected system. Using it, the attacker can perform reconnaissance, take different malicious actions, or download and deploy other malware (ransomware, etc.) to carry out specialized attacks.
RATs are often one of the first pieces of malware that an attacker installs on an infected computer. If they don’t infect the computer directly, they’re installed by dropper or downloader malware designed solely to slip past an organization’s defenses and install more sophisticated malware.
Cyber threat actors use various methods to infect a computer with RATs. Some common examples include:
After being executed on a device, RATs typically engage in information collection. Some common tactics include:
This and other information collected by the malware will be exfiltrated to the RAT operator. This provides additional context for them to plan their attack. For example, a RAT that infects a particularly high-value target may be a focus for data theft, while other infected systems may just be added to a botnet.
RATs also commonly conceal their presence on a system and strengthen their foothold. This could include taking steps to hide their presence from endpoint security systems and establishing methods to reinstall or relaunch themselves after being deleted or a system restart.
The primary purpose of a RAT is to provide an attacker with remote access to and control over an infected system. For this to occur, the malware and its operator need to be able to communicate with one another.
Most RATs communicate over the network while taking steps to conceal their command and control (C2) channels from detection. For example, a RAT may be configured to make HTTPS requests to an attacker-controlled domain so that exfiltrated data and commands to the malware can be included in the requests and responses. This both conceals the RAT’s communications in a common type of traffic and allows the data to be encrypted, reducing the risk of detection.
RATs can be extremely versatile malware, and different variants have different areas of focus. Some common capabilities of RATs include:
RATs pose a significant threat to organizations and individuals alike because they provide an attacker with remote access to and control over a compromised device. Some of the potential impacts include:
Botnets can target an organization or an individual. Some cybercrime groups use RATs as part of their standard attack campaign. For example, Mustang Panda, an APT group, is well-known for deploying PlugX, a RAT, as part of their attacks targeting governments around the world.
High-profile individuals may also have their devices infected with RATs. One famous example is the Pegasus malware, which was developed by the NSO Group and made accessible to governments to monitor journalists or members of the opposition.
The first step to remediating a RAT infection is identifying its presence on a system. Some potential indicators of compromise (IoCs) include:
While RATs can be detected via all of these means, antimalware is the best defense against a potential infections. Installing reputable software on every system and configuring it to perform regular updates and scans is the best way to identify infections on a device.
Organizations can also implement other security best practices to help with identifying RATs. For example, monitoring network traffic and access requests can help to identify if malware is communicating with an attacker or attempting to move laterally through an organization’s network.
The best way to manage the risk posed by a RAT is to prevent infections from occurring in the first place. This includes blocking common infection vectors via the following best practices:
An organization should implement defense in depth to protect against RATs and other malware. For example, it might use email scanning to identify and block phishing emails while also training users to identify and defend against these threats. If the RAT slips through these defenses, antimalware and IDS/IPS tools can detect the RAT or its communications, enabling the organization to remediate the infection.
In the event that an organization’s systems have been infected by a RAT, they can remove the malware via the following steps:
Remote access trojans exist in a legal and ethical gray area. The software itself and its capabilities aren’t necessarily malicious. In fact, system administrators commonly use tools that resemble RATs to perform remote configuration and management of systems under their care.
For example, tools like TeamViewer and the Remote Desktop Protocol (RDP) provide remote monitoring and management capabilities like a RAT. There are also applications used by legitimate businesses to monitor remote employees’ productivity that use keylogging and surveillance capabilities similar to those of RATs.
In the end, the legal and ethical aspects of RATs come down to how they are used. If a RAT is used for legitimate system or business administration with the consent of the system owner and users, then using RAT-like software is legal and ethical. If this is not the case, then the use case has questionable legality and ethics.
RATs pose a significant threat to the security and privacy of organizations and individuals alike. These malware are not only designed to allow attackers to collect and steal sensitive data but also to spy on users and perform other malicious actions.
Bitdefender’s Endpoint Security solutions offer robust RAT detection and remediation capabilities. ML-powered threat detection rapidly identifies known and novel RAT variants alike. GravityZone Network Attack Defense can detect and block lateral movement from one infected endpoint to another, a common tactic used by threat actors.
GravityZone XDR offers sensors to monitor activity across networks, systems, productivity applications, cloud workloads, and identity platforms that are associated with cybercriminal movement, including that associated with RATs.
GravityZone Security for Mobile provides advanced protection to iOS, Android, and Chromebook devices against cyber attacks including RATs.
RATs are designed to spy on their targets and enable an attacker to perform malicious activities on an infected device. If a program asks for unnecessary permissions — such as access to a camera or microphone — or a computer is behaving oddly, it may be infected by a RAT.
Yes, smartphones and other mobile devices can be infected by mobile RATs. These may masquerade as legitimate apps downloaded from an appstore or be installed by exploiting vulnerabilities in a mobile OS.
Malicious downloads are a common delivery vector for RATs, so checking a download before trusting it is always a good idea. If your antimalware doesn’t automatically scan the file, you can manually trigger a scan before opening or running a file.