What is RAT ?
As i have told you in my introduction paragraph RAT is Remote Access trojan. It is a peace of software or program which hacker uses to get complete control of your computer. It can be send to you in form of images, videos or any other files. Their are some RAT that even your antivirus software can not detect. So always be sure about what you are downloading from the internet and never save or download files that anonymous user send you over the mail or in chat room.
What You can do with RAT ?
Once a RAT is installed on any computer hacker can do almost anything with that computer. Some malicious task that you can do with RAT are listed below:
- Infecting Files
- Installing Keyloggers
- Controlling Computer
- Remotely start webcam, sounds, movies etc
- Using your PC to attack Website (DDOS)
- View Screen
Harmless RAT or Good RAT
As you have seen how harmfull RAT are for your computer, but their are some good RAT which some of you might be using daily. You might have heard of TeamViewer, it is a software which you use to control some one’s computer with his permission for file transfer, sharing your screen and more.
Some Commonly Used RAT
- ProRAT
- CyberGate RAT
- DarkComet RAT
Exploit
Exploits are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer.Rootkit
Rootkits are designed to conceal certain objects or activities in your system. Often their main purpose is to prevent malicious programs being detected – in order to extend the period in which programs can run on an infected computer.Trojan-Banker
Trojan-Banker programs are designed to steal your account data for online banking systems, e-payment systems and credit or debit cards.Trojan-DDoS
These programs conduct DoS (Denial of Service) attacks against a targeted web address. By sending multiple requests – from your computer and several other infected computers – the attack can overwhelm the target address… leading to a denial of service.Trojan-Downloader
Trojan-Downloaders can download and install new versions of malicious programs onto your computer – including Trojans and adware.Trojan-Dropper
These programs are used by hackers in order to install Trojans and / or viruses – or to prevent the detection of malicious programs. Not all antivirus programs are capable of scanning all of the components inside this type of Trojan.Trojan-FakeAV
Trojan-FakeAV programs simulate the activity of antivirus software. They are designed to extort money from you – in return for the detection and removal of threats… even though the threats that they report are actually non-existent.Trojan-GameThief
This type of program steals user account information from online gamers.Trojan-IM
Trojan-IM programs steal your logins and passwords for instant messaging programs – such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager, Skype and many more.Trojan-Ransom
This type of Trojan can modify data on your computer – so that your computer doesn’t run correctly or you can no longer use specific data. The criminal will only restore your computer’s performance or unblock your data, after you have paid them the ransom money that they demand.Trojan-SMS
These programs can cost you money – by sending text messages from your mobile device to premium rate phone numbers.Trojan-Spy
Trojan-Spy programs can spy on how you’re using your computer – for example, by tracking the data you enter via your keyboard, taking screen shots or getting a list of running applications.Trojan-Mailfinder
These programs can harvest email addresses from your computer.Other types of Trojans include:
Trojan-ArcBomb
Trojan-Clicker
Trojan-Notifier
Trojan-Proxy
Trojan-PSW
How to protect yourself against Trojans
By installing effective anti-malware software, you can defend your devices – including PCs, laptops, Macs, tablets and smartphones – against Trojans. A rigorous anti-malware solution – such as Kaspersky Anti-Virus – will detect and prevent Trojan attacks on your PC, while Kaspersky Mobile Security can deliver world-class virus protection for Android smartphones. Kaspersky Lab has anti-malware products that defend the following devices against Trojans:
- Windows PCs
- Linux computers
- Apple Macs
- Smartphones
- Tablets
Other articles related to Trojans and products to remove Trojan virus
Related articles:
Related products to remove Trojan virus:
No comments:
Post a Comment