Page 21 - index
P. 21







can’t detect the malware and you’re already infected, then what can it do? How about
controlling your computer and using it as one of many ‘hops’ in the chain to obfuscate the

source of an attack? If you get infected with one of these Zero-day RATS (Remote Access
Trojans), you’re not only a victim, you are an accidental accomplice.




Remote Access Trojans

Remote Access Trojans (RATs) that make it onto a computer, undetected, give someone far
away all the control they need of the victim’s computer. RATs are generally sent through emails
by ‘riding’ what looks like as a trusted file attachment such as a PDF, Excel spreadsheet or

Word doc.

Once the victim opens the email and clicks on the attachment, they may actually see a useful or

trustworthy looking PDF, XLS or DOC open up but at the same time the RAT is being installed.
Some less sophisticated RATs will display a fake error message ‘file corrupted’ so you think the
attachment didn’t come through completely and didn’t open.


Many RATS can disable antivirus and firewall software or create covert channels to bypass
them, when sending and receiving information, commands, data and files.


RATs can do just about anything you can think of – this is a sampling of what they are capable
of:


 Watch you type and log your keystrokes
 Watch your webcam and save videos

 Listen in on your microphone and save audio files
 Take control of your computer
 Download, upload and delete files

 Physically destroy a CPU by overclocking
 Install additional tools including viruses and worms

 Edit your Windows registry
 Use your computer for a denial of service (DoS) attack
 Steal passwords, credit card numbers, emails and files

 Wipe your hard drive completely
 Install boot-sector (very hard to remove) viruses


21 Cyber Warnings E-Magazine – December 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   16   17   18   19   20   21   22   23   24   25   26