How to kill Remote Access Trojans

Remote Access Trojans

Detecting Remote Access Trojans can be very challenging because they mimic legitimate commercial remote administration tools, open legitimate network ports, and perform very surgical operations that don’t resemble typical malware techniques, says Udi Shamir, CSO and head of SecurityLabs, SentinelOne.

No doubt this stealth aided attackers who used the Carbanak malware RAT, which, according to “Carbanak APT: The Great Bank Robbery”, February 2015, Kaspersky Labs, infected banks globally, stole funds, and wreaked financial havoc estimated at up to $1 billion in losses.

To deal with these low-down, filthy, social-engineering, vulnerability-crawling varmints, you’ll need to learn their aliases, profile their capabilities, and uncover how to block, starve, and blind them before blowing them away.

To continue reading this article register now

7 hot cybersecurity trends (and 2 going cold)