Hunting remote access trojans (RATs)

HUNTING RATS

Cover

While cybersecurity pros don’t have the legal rights to “hack back”, they can learn what new controls are required, even before a threat actor envisions their new tool, technique or procedure.

A Remote Access Trojan (RAT) is a very common tool used by many criminal groups and individuals across the world. This tool is often considered to be malware, but its functionality can be used for legitimate purposes.

In this hunting guide, discover ways you can seek out threats using threat investigation tools.

Vendor:
DomainTools
Posted:
Feb 8, 2021
Published:
Feb 6, 2020
Format:
PDF
Type:
White Paper
Already a Bitpipe member? Log in here

Download this White Paper!