How to kill Remote Access Trojans

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

Detecting Remote Access Trojans can be very challenging because they mimic legitimate commercial remote administration tools, open legitimate network ports, and perform very surgical operations that don’t resemble typical malware techniques, says Udi Shamir, CSO and head of SecurityLabs, SentinelOne.

No doubt this stealth aided attackers who used the Carbanak malware RAT, which, according to “Carbanak APT: The Great Bank Robbery”, February 2015, Kaspersky Labs, infected banks globally, stole funds, and wreaked financial havoc estimated at up to $1 billion in losses.

To deal with these low-down, filthy, social-engineering, vulnerability-crawling varmints, you’ll need to learn their aliases, profile their capabilities, and uncover how to block, starve, and blind them before blowing them away.

To continue reading this article register now

Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.