A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild
2017
2017 IEEE Symposium on Security and Privacy (SP)
Remote Access Trojans (RATs) give remote attackers interactive control over a compromised machine. Unlike largescale malware such as botnets, a RAT is controlled individually by a human operator interacting with the compromised machine remotely. The versatility of RATs makes them attractive to actors of all levels of sophistication: they've been used for espionage, information theft, voyeurism and extortion. Despite their increasing use, there are still major gaps in our understanding of RATs
doi:10.1109/sp.2017.48
dblp:conf/sp/FarinholtRPDYBM17
fatcat:gfztgkoejzbshi3xlbxom324oi