remote access Trojan (RAT)

GPTKB entity

Statements (52)
Predicate Object
gptkbp:instanceOf malware
Trojan
gptkbp:canBe espionage
cybercriminals
data exfiltration
credential theft
insiders
hacktivists
ransomware deployment
botnet creation
state-sponsored hackers
gptkbp:canBeBypassedBy gptkb:security
firewalls
gptkbp:category cybersecurity
gptkbp:controlledBy command and control server
gptkbp:countermeasures multi-factor authentication
patch management
network segmentation
user education
firewall configuration
antivirus updates
gptkbp:deliveredBy malicious downloads
phishing emails
malicious attachments
exploit kits
gptkbp:detects gptkb:security
network monitoring
endpoint detection and response
gptkbp:firstAppearance 1990s
https://www.w3.org/2000/01/rdf-schema#label remote access Trojan (RAT)
gptkbp:notableExample gptkb:DarkComet
gptkb:Blackshades
gptkb:njRAT
gptkb:Poison_Ivy
gptkb:Back_Orifice
Sub7
gptkbp:purpose remote control of infected computers
gptkbp:target gptkb:Android
gptkb:Windows_operating_system
gptkb:macOS
gptkb:Linux
gptkbp:usedFor surveillance
file transfer
data theft
spying
unauthorized access
screen capture
microphone access
webcam access
keylogging
gptkbp:bfsParent gptkb:Trojan_(software)
gptkbp:bfsLayer 6