A Buyer's Guide To Underground Hacking

Email this CRN article

RATs: Remote Access Trojans

Remote access trojans (RATs) are used in targeted campaigns to give cybercriminals long-term persistence on an infected PC. They are often identified in connection with targeted attack campaigns or advanced persistent threats. RATs provide back-door access and can come with a variety of components that can be used to steal data and gain access to other systems. Financially motivated cybercriminals also use RATs, setting up the RAT's command-and-control server (C2) and configuring the malware to create FUD and possibly infect the target

The RAT services being sold in the underground can consist of setting up a command-and-control server for remote access, a drop point or server where stolen data is uploaded, and capabilities to remain stealthy. Depending on the sophistication and custom work required to create the RAT, the price can range from $50 to $250 on underground hacking forums, Dell said.

Email this CRN article

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.