In: Other
A security consultant is analyzing data from a recent compromise. The following data points are documented:
- access to data on share drives in certain networked host was lost after an employee logged in to an interactive session as a privileged user
- that it was unreadable by any non-commercial software
- The issue spread through the enterprise via SMB only win certain users access data
- removal instructions were not available from any major antivirus vendor
Which of the following types of malware is this an example of?
A. RAT
B. Ransomware
C. Backdoor
D. Keylogger
E. Worm
The answer is RAT:
A RAT is a type of malware that’s very similar to legitimate remote access programs. The main difference, of course, is that RATs are installed on a computer without a user’s knowledge. Most legitimate remote access programs are made for tech support and file sharing purposes, while RATs are made for spying on, hijacking, or destroying computers.
Like most malware, RATs piggyback on legitimate-looking files. Hackers can attach a RAT to a document in an email, or within a large software package, like a video game. Advertisements and nefarious webpages can also contain RATs, but most browsers prevent automatic downloads from websites or notify you when a site is unsafe.