Hunting remote access trojans (RATs)
While cybersecurity pros don’t have the legal rights to “hack back”, they can learn what new controls are required, even before a threat actor envisions their new tool, technique or procedure.
A Remote Access Trojan (RAT) is a very common tool used by many criminal groups and individuals across the world. This tool is often considered to be malware, but its functionality can be used for legitimate purposes.
In this hunting guide, discover ways you can seek out threats using threat investigation tools.