Poison Ivy and Random Access Tools: What You Need to Know

Poison Ivy and Random Access Tools: What You Need to Know

Cover

While remote access tools (RATs) are relatively easy for hackers to use, they can still cause massive damage. A linchpin of sophisticated cyber-attacks, these deceptively simple maneuvers result in the loss of both data and intellectual property. And while many consider them easy to mitigate, their simplicity can help them go undetected.

This guide examines one of the most effective and dangerous RATs, Poison Ivy (PIVY), and explains which tools and tactics you need to defend yourself against this form of cybercrime. Read on to learn how to keep RATs from infiltrating your system. 

Vendor:
FireEye
Posted:
05 Mar 2014
Published:
31 Dec 2013
Format:
PDF
Length:
32 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.