StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Remote Access Computer Trojan - Research Paper Example

Cite this document
Summary
This research "Remote Access Computer Trojan" analyzes how rapid developments in science and technology have actually enabled the cybercriminals to design computer software and viruses which can significantly harm any computer. Furthermore, the author tells about different anti-malware…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Remote Access Computer Trojan
Read Text Preview

Extract of sample "Remote Access Computer Trojan"

Remote Access Computer Trojan Major Characteristics Remote Access Computer Trojan (RAT) enables the hackers and cyber criminals to do almost anything on the victim’s computer. It is typically associated with Advanced Persistent Threat (APT) which facilitates organized cybercrime. The destructive consequences of RAT have actually provoked individuals and different corporations as they have realized that their financial and corporate information is left to the mercy of hackers. For instance, Roger A. Grimes shares his experience of dealing with a RAT infected computer. He says that he observed strange things on his client’s computer such as inverted images, significantly slower performance, CD Rom tray which was opening and closing at random instances, odd error messages etc. He then searched the internet and found out that two Remote Access Trojans have hit the computer and therefore it was acting in such peculiar way [Rog02]. Background RATs are broadly defined as the malevolent computer programs which are entered into the victim’s computer in order to gain access over his confidential information and general activities. These are usually attached with some gaming program or anything else which is often executed by the victims. Once the Trojan is ready to perform its task the intruder is immediately informed through an e-mail. In some case the hacker is able to use victim’s IP address, while in case of corporations the financial transactions or other business operations are usually intervened. Type of breach Let’s consider an example of China where 72 organizations including government offices, corporations and non-profit companies were infected by Remote Access Trojan. This violation was a typical criminal attack in order to leak out confidential information and also to interrupt various financial transactions. However, hunger for country secrets is considered less threatening than financial loss according to MacAfee investigation report covering this breach. Shady RAT, which is a latest Remote Access Tool, was used in this particular cyber-crime. MacAfee detections reveal that Shady RAT specifically slows down the computer system and hence it is generally known as “low and slow” cyber security attack [Mat11]. How the breach occurred? Experts could not identify the real culprits of this case with complete authenticity however, few individuals were seriously suspected. Initially the RAT attack was identified in 2009 by the MacAfee officials while investigating a defense contractor [Mat11]. Thereafter the MacAfee team identified spear-phishing attack which implies that the breach had occurred through entering the command in HTML comments on the web links. MacAfee investigated that the Shady RAT attack had actually initiated in the mid-2006. These attacks were then expanded to 38 Chinese organizations by 2008 [Mat11]. Losses of confidentiality, integrity and availability Much of the confidential information held by the government offices was lost in addition to financial statements. Moreover the intruders were able to penetrate different business operations over a longer period of time and hence it became a matter of damaged integrity since China was unable to locate such intense cyber-crime [Mat11]. Technological improvements Technological advancement has greatly supported the organizations to identify RAT attack while on the other hand it has also enabled them to safeguard their computers long before any threat. Computer security developers are continuously trying to extend maximum technical support against the adverse impacts of Remote Access Trojan. For instance, AVG is an anti-virus program which not only facilitates common computer viruses but also prevents adware and spyware in strictly sensitive workplace settings [Bes13]. Super Anti Spyware is yet another protective agent which successfully identifies and removes Trojans. On the whole anti-malware products are found to be more productive in terms of removing Trojans and other damaging elements from computers. Current technology provides immense protection against Remote Access Trojan up to a certain limit and therefore there are still some chances of recurrence [Bes13]. Prevention methods In the last few years Remote Access Trojan has significantly affected corporations and various government organizations by simply intervening in confidential matters. Huge anti-virus companies such as MacAfee and others have come up with some preventive strategies and therefore a consensus has been developed i.e. it’s better to take preventive actions rather than identifying RAT attacks and trying to restore the lost information. Hence following are some of the most applicable prevention methods against Remote Access Trojans [Mal13]: Preservation of the internal application flow activities especially when VDI or VPN browsers are used. This significantly decreases the ability of RAT intruders. Jamming the spear-phishing attacks and malware installation processes can also help in reducing the adverse effects of future RAT infections. Organizations with massive confidential information are required to develop balanced management overhead and resource consumption systems so as to protect and reduce the risks associated with RAT. All the VPN access must be made within secured and protected internet connections i.e. the end point security must be at functioning state. Conclusion Rapid developments in science and technology have actually enabled the cyber criminals to design computer software and viruses which can significantly harm any computer. Moreover the current computer viruses such as Remote Access Trojan are able to leak out the confidential information from government offices, secret agencies and huge corporations. RAT attack is actually executed through entering the bonded command in to the computer [Rog02]. For instance, intruders usually bind RAT with games so that whenever they are operated the RAT automatically transfers in to the system. Thereafter the intruder receives an email of successful operation that is now virtually able to conduct any destructive activity within the victim’s computer while on the other hand the victim witnesses symptoms such as inverted images, slow processing, random activity of hardware etc. [Rog02]. RAT was extensively used in infecting 72 organizations in China whereas MacAfee revealed that the breach was conducted to steal sensitive information [Mat11]. Technological advancement has enabled the computer security developers to design different anti-malware in order to extend maximum security to different organizations and sensitive agencies. References Rog02: , (Grimes, 2002), Mat11: , (Schwartz, 2011), Bes13: , (Best Free Trojan Horse Scanning And Removal Software, 2013), Mal13: , (Malicious Software for Endpoint Takeover and Exploitation, 2013), Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Remote Access Computer Trojan Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Remote Access Computer Trojan Research Paper Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1485557-remote-access-computer-trojan-rat
(Remote Access Computer Trojan Research Paper Example | Topics and Well Written Essays - 1000 Words)
Remote Access Computer Trojan Research Paper Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1485557-remote-access-computer-trojan-rat.
“Remote Access Computer Trojan Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1485557-remote-access-computer-trojan-rat.
  • Cited: 0 times

CHECK THESE SAMPLES OF Remote Access Computer Trojan

Advanced Computing Integration in Almost Every Industry

For example, hackers may gain access to the military radar systems, credit card data stolen, data stolen from the Federal Bureau of Investigation (FBI) has revealed secret agents and now their life is at risk etc.... Once the network is hacked, they install small lop holes or software intruders for giving hackers access whenever they...
6 Pages (1500 words) Research Paper

Vulnerability Assessment on your System at Home

They are searching for any loop holes to govern the networks and computing devices along with highly classified.... The vulnerabilities can be found in the web browser and their plug-ins, web servers and application… We talk about the launch of a new software or operating system with better graphical user interface; functionality, utilities, and security, at the other end hackers discuss how to breach the security Hackers having time, resources and enthusiasm can breach into any system....
14 Pages (3500 words) Essay

Malware and its Effects

remote access Trojans (RATs) are those that can create a backdoor system that allow the hacker access to one's computer and is even able to send commands via root access capabilities (Brodkin, 2013).... Backdoors can be used by hackers to steal information from a server undetected and are similar to remote access Trojans in their functionality (Brodkin, 2013).... rojans – These malware is named after the Greek mythology of the trojan horse due to their innocent appearance to the user so as to avoid suspicion of the actual danger that they yield (Brodkin, 2013)....
2 Pages (500 words) Essay

Security Protocols

The monitor method can monitor a network without the need to share data with any of the access points.... Promiscuous method views all the data that flows through the two access points.... The paper "Security Protocols" states that the company's security is almost nonexistent....
13 Pages (3250 words) Coursework

IT Risk Analysis

n the current constantly advancing business and technological world, having a well-managed and secured computer system has always been a very crucial subject of concern.... Organizations are fighting tooth and nail to ascertain that they work with computer systems that guarantee confidentiality, integrity and secure availability of resources (Vellani 2007).... To be precise, the delivery of the targeted computer systems largely depends on the adoption of a strategic analysis of information technology risks....
22 Pages (5500 words) Case Study

Likely Threats in a Pharmacy and Their Control Measures

This literature review "Likely Threats in a Pharmacy and Their Control Measures" refers to using electronic means such as a remote computer to gain access to the unauthorized place.... nbsp;Physical threats refer to physical access to unauthorized access location with malicious intent.... andalism can also occur in case of unauthorized access.... nauthorized physical access to the pharmacy poses a major threat....
9 Pages (2250 words) Literature review

Technology Advance and Networks Security

According to Harrington (2005), computer crime or cybercrime is a relatively new phenomenon in the world today.... It is caused by intentional or irresponsible actions of individuals who take advantage of the universality and vulnerability of computers and computer networks.... In light of this understanding, many organizations are aware of the dangers of computer-related crime and are taking measures to ensure network security in an effort to safeguard their valuable data and that of their clients....
6 Pages (1500 words) Coursework

Cyber Security and Digital Forensics

Malware is a common term applied in defining malicious software that contributes to security threats to a computer system and the internet (Rossow 5-6).... This paper "Cyber Security and Digital Forensics" argues that many businesses are unaware of attacks and have slow responses to these risks that endanger the security of the entire organization....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us