请输入您要查询的百科知识:

 

词条 Remote access trojan
释义

  1. Notable examples

  2. References

{{Use American English|date = March 2019}}{{Short description|Type of malware}}{{Use mdy dates|date = March 2019}}{{Tone|date=January 2012}}A Remote Access Trojan (RAT, sometimes called Creepware[1]) is a type of malware that controls a system through a remote network connection. While desktop sharing and remote administration have many legal uses, "RAT" connotes criminal or malicious activity. A RAT is typically installed without the victim's knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from security software and other anti-virus software.[2][3][4][5][6][7]

Notable examples

  • PoisonIvy
  • Sub Seven
  • Beast Trojan
  • Bifrost[8]
  • Blackshades[9][10]
  • DarkComet[11][12]

References

1. ^{{cite web|url=http://www.symantec.com/connect/blogs/creepware-who-s-watching-you|title=Creepware — Who’s Watching You?|date=10 December 2013|work=Symantec Security Response}}
2. ^{{Cite web|url=https://technet.microsoft.com/en-us/library/ee449475%28WS.10%29.aspx|title=Remote Server Administration Tools for Windows 7|publisher=Microsoft Technet June 4, 2009|accessdate=4 February 2011}},
3. ^{{Cite web|url=https://technet.microsoft.com/en-us/library/dd632947.aspx|title=Danger: Remote Access Trojans|publisher=Microsoft technet September 2002|accessdate=5 February 2011}}
4. ^{{Cite web|url=https://technet.microsoft.com/en-us/library/cc751300.aspx|title=Understanding the Windows NT Remote Access Service|publisher=Microsoft technet date undisclosed|accessdate=5 February 2011}}
5. ^{{Cite web|url=https://technet.microsoft.com/en-us/library/cc757467%28WS.10%29.aspx|title=Netsh commands for remote access (ras)|publisher=Microsoft technet January 21, 2005|accessdate=5 February 2011}}
6. ^{{Cite web|url=http://support.microsoft.com/kb/267861|title=RAS Registry Modification Allowed Without Administrative Rights|publisher=Microsoft technet date undisclosed|accessdate=5 February 2011}}
7. ^{{Cite web|url=http://howtheyhack.com/computer-rats-protecting-your-self/|title=Computer RATS - Protecting Your Self|publisher=HowTheyHack July 2013|accessdate=17 July 2013}}
8. ^{{Cite web|url=http://www.codinghorror.com/blog/2007/03/code-access-security-and-bitfrost.html|title=Code Access Security and bifrost|publisher=Coding hooro.com Mar 20, 2007|accessdate=5 February 2011}}
9. ^{{cite web | url=https://www.bbc.com/news/uk-27471218 | title=BlackShades: Arrests in computer malware probe | publisher=BBC | accessdate=20 May 2014}}
10. ^{{cite web | url=https://www.fbi.gov/newyork/press-releases/2014/remarks-prepared-for-delivery-by-special-agent-in-charge-leo-taddeo-at-blackshades-press-conference | title=Remarks Prepared for Delivery by Special Agent in Charge Leo Taddeo at Blackshades Press Conference | publisher=FBI | accessdate=20 May 2014}}
11. ^{{cite web|last=Denbow|first=Shawn|title=pest control: taming the rats|url=http://www.matasano.com/research/PEST-CONTROL.pdf|accessdate=5 March 2014}}
12. ^{{cite web|last=Aylward|first=Laura|title=MALWARE ANALYSIS - DARK COMET RAT|url=http://contextis.com/research/blog/malware-analysis-dark-comet-rat/|publisher=Context|accessdate=5 March 2014}}

4 : Remote administration software|Windows remote administration software|Computer viruses|Trojan horses

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/11 10:44:08