{"id":4487,"date":"2015-09-02T16:12:57","date_gmt":"2015-09-02T16:12:57","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4487"},"modified":"2020-12-16T12:23:56","modified_gmt":"2020-12-16T17:23:56","slug":"a-laymans-dictionary-rat","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/a-laymans-dictionary-rat\/4487\/","title":{"rendered":"A layman&#8217;s dictionary: RAT"},"content":{"rendered":"<p>RAT is a term that is frequently used in cybersecurity publications, although it\u2019s not encountered as often as Trojan. Still, in late August, Threatpost mentioned various RATs at least three times.<\/p>\n<p>RAT stands for Remote Administration Tool. While it may sound rather innocuous, the term \u201cRAT\u201d is usually associated with the software used for criminal or malicious purposes. So the abbreviation totally makes sense, however, there are possible variations: Remote Access Tool, Remote Access Trojan, etc.<\/p>\n<p>Malicious RAT software is typically installed without the victim\u2019s knowledge, often as payload of a Trojan horse, and will try to conceal its operation from the victim and from security software as well.<\/p>\n<p><\/p><blockquote class=\"twitter-pullquote\"><p>A layman\u2019s dictionary: #RAT #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fe9Pq&amp;text=A+layman%26%238217%3Bs+dictionary%3A+%23RAT+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote><br>\n<strong>Smelling the rat<\/strong>\n<p>RATs today are often a part of Trojan and backdoors: their capabilities allow an attacker to control the victim\u2019s computer in many ways, including downloading any software (malware included, of course), uploading, deleting and renaming files, formatting drives, stealing passwords and credit card numbers, etc. In fact, a well-designed RAT allows an attacker to do anything they could do with the machine they have physical access to, which makes it a perfect espionage tool. RATs, among other things, allow for recording audio and video (if the appropriate hardware is present), recording and controlling the victim\u2019s screen remotely, silently installing applications, viewing, killing, and starting tasks in task manager, and surfing the web with the IP-address of the infected computer.<\/p>\n<p>Add here the possibility to overclock hardware down to its destruction.<\/p>\n<p><strong>Burrowing into the system<\/strong><\/p>\n<p>While real-world rodents can make the holes themselves, their cyber-\u201ccounterparts\u201d require security holes to already be present. Those are not limited to software flaws.<\/p>\n<p>One recently exposed campaign used some very convincing phishing mail coupled with macros-laden Word docs to deliver AutoIt RAT and plant malware.<\/p>\n<p>While Microsoft disabled macros by default 8 years ago, hackers recently started exploiting them again, using phishing e-mails that urged victims to enable macros. This campaign is just an example of such an attack. Once the macros are enabled, the attack is executed, and the macros downloads some binaries and archives, bringing AutoIt RAT.<\/p>\n<p>AutoIt is a totally legitimate, freeware tool that allows Windows administrators to write scripts that automate tasks. A\u00a0huge, 600 Mb AutoIt script is downloaded along with it, and includes antianalysis checks, payload decryption, malware installation and persistence mechanisms. The script also installed other RATs (Cybergate or NanoCore), or the Parite worm. A detailed description can be found <a href=\"https:\/\/threatpost.com\/autoit-used-in-targeted-attacks-to-move-rats\/114406\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p>Among other recent finds are the remote access Trojans named uWarrior and Jsocket. The latter turned out to be a\u00a0<a href=\"https:\/\/threatpost.com\/alienspy-rat-resurfaces-as-jsocket\/114385\" target=\"_blank\" rel=\"noopener nofollow\">refurbished <\/a>AlienSpy remote access Trojan.<\/p>\n<p>The former in turn looks like a Mr. Stitch among the RATs, borrowing various ready-off-the-shelf components from other malware (such as ctOS RAT). Researchers said, however, that the malware is \u201cfully featured\u201d and when it comes to exploitation, \u201cthe combination of methods and affected code is both new and complex.\u201d<\/p>\n<p><a href=\"https:\/\/threatpost.com\/researchers-uncover-new-italian-rat-uwarrior\/114414\" target=\"_blank\" rel=\"noopener nofollow\">According to Threatpost<\/a>, \u201c<em>The malware includes two old remote exploit code execution bugs, CVE-2012-1856 and CVE-2015-1770. The former, which affected the Microsoft Windows Common Controls MSCOMCTL.OCX back in 2012, is apparently back and using a novel return-oriented programming (ROP) chain to bypass ASLR\u2026<\/em>\u201d<\/p>\n<p>The uWarrior arrives embedded in rigged .RTF documents \u2013 which means phishing is the primary infection vector.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>RATs often\u00a0are part of the #Trojan and #backdoors and are detected as such. #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fe9Pq&amp;text=RATs+often%C2%A0are+part+of+the+%23Trojan+and+%23backdoors+and+are+detected+as+such.+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Deratization<\/strong><\/p>\n<p>As said above RATs are often part of Trojans and backdoors, and they get into the system the \u201cusual\u201d ways \u2013 via <a href=\"https:\/\/business.kaspersky.com\/q2-spam-phishing\/4466\/\" target=\"_blank\" rel=\"noopener nofollow\">phishing <\/a>emails, macros-packed Word docs, exploiting software flaws, etc. All of these are preventable.<\/p>\n<p>Kaspersky Lab business products are capable of detecting and blocking these threats using a large array of protective technologies, which include both malware detection, behavioural analysis, system and vulnerability assessment, and patch management tools. For more information on these functions please visit Kaspersky Lab\u2019s <a href=\"https:\/\/www.kaspersky.com\/business-security\/endpoint-advanced\" target=\"_blank\" rel=\"noopener nofollow\">corporate site<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RAT stands for Remote Administration Tool. While it may sound rather innocuous, the term &#8220;RAT&#8221; is usually associated with the software used for criminal or malicious purposes.<\/p>\n","protected":false},"author":209,"featured_media":15580,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2337,746,422],"class_list":{"0":"post-4487","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-glossary","10":"tag-rat","11":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/a-laymans-dictionary-rat\/4487\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/a-laymans-dictionary-rat\/4487\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/a-laymans-dictionary-rat\/4487\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/glossary\/","name":"glossary"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4487"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4487\/revisions"}],"predecessor-version":[{"id":38100,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4487\/revisions\/38100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15580"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4487"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}