Professional Documents
Culture Documents
RAT RemoteAdministrativeTrojan
RAT RemoteAdministrativeTrojan
net/publication/348325861
CITATIONS READS
0 270
2 authors, including:
Latika Kharb
Jagan Institute of Management Studies
131 PUBLICATIONS 190 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Latika Kharb on 08 January 2021.
I. INTRODUCTION
COMMON TYPES OF TROJAN MALWARE
A RAT or remote administration tool, is software that gives a
person full control a tech device, remotely. The RAT gives the • Backdoor Trojan:
user access to your system, just as if they had physical access This Trojan can create a “backdoor” on your computer. It lets
to your device. With this access, the person can access your an attacker access your computer and control it. Your data can
files, use your camera, and even turn on/off your device. RAT be downloaded by a third party and stolen. Or more malware
is used to remotely connect and manage single or multiple can be uploaded to your device.
computers. RAT is one of the most dangerous Trojan because
it compromises features of all types of Trojans. It provides an • Distributed Denial of Service (DDoS) attack Trojan:
attacker with nearly unlimited access to host computer along This Trojan performs DDoS attacks. The idea is to take down
with Screen Capture, File management, shell control and a network by flooding it with traffic. That traffic comes from
device drivers control. RATs uses reverse connections to your infected computer and others.
connect remote system and hence are more likely to remain
undetected. They can hide themselves in process space of • Downloader Trojan:
legitimate program and hence never appear in task manager or This Trojan targets your already-infected computer. It
system monitors. A Trojan generally has two parts Client and downloads and installs new versions of malicious programs.
Server or Master and Slave. We can say Server is Slave and These can include Trojans and adware.
Client is Master. So a server side is installed on a remote host
and the attacker manipulates it with client software. • Fake AV Trojan:
This Trojan behaves like antivirus software, but demands
II. THREATS money from you to detect and remove threats, whether they’re
real or fake.
RAT allows an attacker to gain access to the following items
on a compromised computer: • Game-thief Trojan:
• Files The losers here may be online gamers. This Trojan seeks to
• Processes steal their account information.
• Services
• Clipboard • Infostealer Trojan:
• Active network connections As it sounds, this Trojan is after data on your infected
• Registry computer.
• Printers
• Remotely control the compromised desktop • Mailfinder Trojan:
• Take screenshots This Trojan seeks to steal the email addresses you’ve
• Record webcam footage accumulated on your device.
• Record audio
• Log keystrokes • Ransom Trojan:
• Steal passwords This Trojan seeks a ransom to undo damage it has done to
• Download files your computer. This can include blocking your data or
• Open Web pages impairing your computer’s performance.
• Display onscreen messages
• Play audio messages using the text-to-speech function • Remote Access Trojan:
• Restart the compromised computer This Trojan can give an attacker full control over your
• Hide the taskbar computer via a remote network connection. Its uses include
• Hide desktop icons stealing your information or spying on you.
• Cause system failure/blue screen of death
Page | 50 www.ijsart.com
IJSART - Volume 5 Issue 2 –FEBRUARY 2019 ISSN [ONLINE]: 2395-1052
Page | 51 www.ijsart.com
IJSART - Volume 5 Issue 2 –FEBRUARY 2019 ISSN [ONLINE]: 2395-1052
REFERENCES
Page | 52 www.ijsart.com
IJSART - Volume 5 Issue 2 –FEBRUARY 2019 ISSN [ONLINE]: 2395-1052
[3] https://searchsecurity.techtarget.com/definition/RAT-
remote-access-Trojan
[4] Garg P, Kharb L (2018), Bugs in Silicon, International
Journal of Engineering Research in Computer Science
and Engineering, 5(1).
[5] https://www.symantec.com/connect/blogs/creepware-
who-s-watching-you
[6] https://en.wikipedia.org/wiki/Remote_access_trojan
[7] https://gbhackers.com/gravityrat-remote-access-trojan/
Page | 53 www.ijsart.com