
Well-known and long-established Remote Access Trojans include the SubSeven, Back Orifice, and Poison-Ivy applications. While the full history of Remote Access Trojans is unknown, these applications have been in use for a number of years to help attackers establish a foothold onto a victim’s PC. This backdoor into the victim machine can allow an attacker unfettered access, including the ability to monitor user behavior, change computer settings, browse and copy files, utilize the bandwidth (Internet connection) for possible criminal activity, access connected systems, and more Rats Pack Download.

Remote Access Trojans differ from keyloggers in that they provide the capability for an attacker to gain unauthorized remote access to the victim’s machine via specially configured communication protocols which are set up upon initial infection of the victim’s computer. Remote Access Trojans often mimic similar behaviors of keylogger applications by allowing the automated collection of keystrokes, usernames, passwords, screenshots, browser history, emails, chat lots, etc.

Rats Pack Download Remote Access Trojans are programs that provide the capability to allow covert surveillance or the ability to gain unauthorized access to a victim’s PC.
