Hunting remote access trojans (RATs)

Hunting Remote Access Trojans

Cover

While cybersecurity pros don’t have the legal rights to “hack back”, they can learn what new controls are required, even before a threat actor envisions their new tool, technique or procedure.

A Remote Access Trojan (RAT) is a very common tool used by many criminal groups and individuals across the world. This tool is often considered to be malware, but its functionality can be used for legitimate purposes.

In this hunting guide, discover ways you can seek out threats using threat investigation tools.

Vendor:
DomainTools
Posted:
06 Feb 2020
Published:
06 Feb 2020
Format:
PDF
Length:
21 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!