This resource is no longer available

Anatomy of a Gh0st RAT - Know Your Digital Enemy

Cover

Cybercriminals are after remote access and control of your hosts. They use RAT tools for this purpose because they are efficient, powerful and can manage thousands of compromised hosts. Understanding how these tools work will help you put in place countermeasures to defend against their use.

The threat experts at McAfee have published an analysis describing in detail how the Gh0st RAT operates with tips on how to identify a host compromised by the RAT and how to defend against it.

Vendor:
McAfee, Inc.
Posted:
06 Apr 2012
Published
06 Apr 2012
Format:
PDF
Length:
36 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.