Select Page

Remote Access Trojans

Remote Access Trojans

Remote Access Trojans have become a serious security concern as hackers have developed more sophisticated code that can be installed and hidden on a target system, unknown to the user. According to UMUC (n.d.) Remote Access Trojans are a form of backdoor that can provide unauthorized access and use of digital assets on a victim’s computer system. It essentially masquerades as a legitimate application. They allow hackers to perform a number of malicious tasks such as stealing information from a system, or installing other malicious software.

Earlier this month a sophisticated Remote Access Trojan resurfaced after more than a decade since it was first released. Whittaker (2017). The malicious code in question called ‘Hacker’s Door’ that draws similarities to a RAT of the same name that first appeared in 2004. The new version includes both backdoor and rootkit functionality and was initially detected in the aerospace industry. Security experts are working on determining the potential damage this RAT could cause in the months ahead.

According to UUFIX (2017), a forensic investigator may use a number of methods in order to identify a potential RAT program. Viewing running processes, checking startup applications, and inventorying a list of all installed programs are some steps an investigator might take. I addition to this checking internet connection speeds and using third party forensics scanning software will also aid in the detection of RAT programs.


UMUC (n.d.). Cybercrime Investigation and Digital Forensics. Retrieved from:

UUFX (2017). Remote Access Trojan (RAT) – How to Detect and Remove it? Retreived from:

Whittaker, Z. (2017). Chinese backdoor malware resurfaces after more than a decade. ZDNet. Retrieved from:

Related Articles

Series Navigation<< Presenting Digital EvidenceMalicious Code Detection >>

About The Author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment. In my spare time I teach undergraduate classes in web development.

Leave a reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.