This resource is no longer available
Anatomy of a Gh0st RAT - Know Your Digital Enemy
Cybercriminals are after remote access and control of your hosts. They use RAT tools for this purpose because they are efficient, powerful and can manage thousands of compromised hosts. Understanding how these tools work will help you put in place countermeasures to defend against their use.
The threat experts at McAfee have published an analysis describing in detail how the Gh0st RAT operates with tips on how to identify a host compromised by the RAT and how to defend against it.