How to kill remote-access trojans

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

Detecting remote access trojan attacks can be very challenging because they mimic legitimate commercial remote administration tools, open legitimate network ports and perform very surgical operations that don’t resemble typical malware techniques, says Udi Shamir, CSO and head of SecurityLabs, SentinelOne.

No doubt this stealth aided attackers who used the Carbanak malware RAT, which, according to “Carbanak APT: The Great Bank Robbery”, February 2015, Kaspersky Labs, infected banks globally, stole funds, and wreaked financial havoc estimated at up to $1 billion in losses.

To deal with these low-down, filthy, social-engineering, vulnerability-crawling varmints, you’ll need to learn their aliases, profile their capabilities and uncover how to block, starve and blind them before blowing them away.

To continue reading this article register now

Join the discussion
Be the first to comment on this article. Our Commenting Policies