2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2020
DOI: 10.1109/eurospw51379.2020.00067
|View full text |Cite
|
Sign up to set email alerts
|

Growth and Commoditization of Remote Access Trojans

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…Remcos RAT is a remote administration tool designed to provide attackers with comprehensive control over infected systems. Known for its versatility, Remcos enables a range of malicious activities, including keylogging, file manipulation, and screen capturing as mentioned by Valeros & Garcia (2020). NanoCore is a compact, yet harmful RAT that has gained notoriety for its effectiveness in facilitating unauthorized remote access.…”
Section: Theoretical Notions About Remote Access Trojans (Rats)mentioning
confidence: 99%
See 1 more Smart Citation
“…Remcos RAT is a remote administration tool designed to provide attackers with comprehensive control over infected systems. Known for its versatility, Remcos enables a range of malicious activities, including keylogging, file manipulation, and screen capturing as mentioned by Valeros & Garcia (2020). NanoCore is a compact, yet harmful RAT that has gained notoriety for its effectiveness in facilitating unauthorized remote access.…”
Section: Theoretical Notions About Remote Access Trojans (Rats)mentioning
confidence: 99%
“…Recognized for its modular design, NanoCore allows threat actors to customize its capabilities based on their specific objectives. This adaptability makes it a formidable tool for executing various malicious activities, such as data theft and system manipulation (Valeros & Garcia, 2020).…”
Section: Theoretical Notions About Remote Access Trojans (Rats)mentioning
confidence: 99%
“…RATs [41] Allows a hacker to take control of the computer and conduct activities such as exploring files, financial transactions, harvesting login credentials.…”
Section: Name Property Examplesmentioning
confidence: 99%
“…It may behave as spyware to capture keystrokes, audio, and video in the background and ship it to the hacker in real-time. (Valeros & Garcí a, 2020)…”
Section: Remote Access Trojanmentioning
confidence: 99%