Find the definition of the most commonly used cyber security terms in our glossary below.

What is Remote Access Trojan in cyber security?

Remote Access Trojans (RATs) represent a type of malicious software designed to give an attacker full control over a victim's system. By connecting to a command-and-control server managed by the attacker, RATs can execute a variety of actions, from the ability to manipulate system files and steal personal data to leveraging system resources for attack campaigns. But RATs are especially sinister, as they often remain concealed within the system without the victim's knowledge. They can monitor user behavior through keystrokes, taking screenshots, or accessing the camera. Among the many types of RATs, some notable ones include Gh0st RAT, jRAT, and Poison Ivy. Evading these trojans requires a comprehensive security strategy including firewalls, antimalware tools, keeping systems patched, and practicing secure behaviors.