

Like most malware and computer bugs, RATs hide in legitimate looking files. Legitimate remote access programs are made for tech support and file sharing purposes, while RATs are made for spying on, stealing from, hijacking, or destroying computer data. The main difference, of course, is that a RAT is installed on the computer without your knowledge, and without your consent. They can open documents, download software, copy files, delete data and manipulate EV-ERRRY-THING on the computer… in real time.Ī RAT is a type of malware that’s very similar to legitimate remote access programs. With remote access is enabled, authorized users, computers and servers can control everything that happens on your PC. If you’ve ever had to call tech support for your personal computer (PC), then you’re probably familiar with the beauty of remote access. RATs are very, very nasty creatures.īut how does a RAT work, why do hackers use them, and how do you avoid them? RATs Give Hackers Remote Access to Your Computer RAT is an acronym that means REMOTE ACCESS TROJAN !!!Ī RAT is a type of computer bug, aka malware, that allows hackers to monitor and control your computer or network. No good thing can come from RATs attacking your organization !!! Have you seen a RAT ? Are you responsible for a RAT ?!! RATs are nasty, nasty creatures.
