SlideShare a Scribd company logo
Research and discuss an incident where it was discovered that a Remote Access Trojan (RAT)
was found in a corporate network. How did the RAT infiltrate the network? What could have
been done to protect the network from the RAT? How was the RAT detected?
Solution
RAT (Remote Access Trojan)
-->Corporate networks are more vulnerable to RAT because of the classified files stored by these
corporations some of which can be used by competitors to devise wining strategies.
-->In our local branch, the company realized that there were times when stranger accessed the
company’s networks and servers remotely.
-->One of the main reason why RAT was suspected was the there were sensitive passwords that
not many could easily find, but in the end it was realized that the key strokes of the
general manager were logged by in a limited function Trojan that could easily be identities that
may have been remotely downloaded .
-->During the forensic investigation, it was realized that the malware also downloaded chat
information from the chat servers, and unauthorized FTP malware.
-->Finally, the system administrator also realized that there were constant complaints of a slow
computers which means that the computing resources were being shared with
unauthorized users while the authorized users though they were using legitimate software .
-->Virtualization may be a new technique used by forensic investigators to identify the potential
RAT program.
-->The virtualization process involves using a virtual computers or partitioned hard disk to
examine the behaviors of the malware and determine the files it can corrupt in a real system.
-->For example, because the RAT was used to successfully exploit the vulnerabilities and
deficiencies of the windows OS, windows OS can be virtualized to help identify the changed that
the RAT can make to the registry file of the computer
-->RATs are very common and designed to provide the attacker with complete control over the
victim's system.
-->They can be used to steal sensitive information, to spy on victims, and remotely control
infected computers.
-->RAT infections are typically carried out via spear phishing and social engineering attacks.
Most are hidden inside heavily packed binaries that are dropped in the later stages of the
malware’s payload execution.
RATs have been a mainstay in cyber attackers’ tool kits for some time, they continue to be very
challenging to detect for the following reasons:
-->They open legitimate network ports on the infected machines. Since this is a very common
operation, it appears benign to most security products.
-->They mimic legitimate commercial remote administration tools.
-->They perform very surgical operations that do not resemble common malware techniques.

More Related Content

Similar to Research and discuss an incident where it was discovered that a Remo.pdf

Computing safety
Computing safetyComputing safety
Computing safety
Brulius
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
Dan Morrill
 
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm IntelligenceOrder vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Priyanka Aash
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...
Tiffany Sandoval
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
shreyng
 
The Other Side Of The Fence. Dealing With Hackers And Malware
The Other Side Of The Fence. Dealing With Hackers And MalwareThe Other Side Of The Fence. Dealing With Hackers And Malware
The Other Side Of The Fence. Dealing With Hackers And Malware
Prasanna V
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Raghav Bisht
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Amitesh Bharti
 
Spiffy Spyware Stuff
Spiffy Spyware StuffSpiffy Spyware Stuff
Spiffy Spyware Stuff
n|u - The Open Security Community
 
Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajaliwebhostingguy
 
RAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan BansalRAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan Bansal
OWASP Delhi
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
AmardeepKumar621436
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
SUBHI7
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System ThreatsReddhi Basu
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
Wail Hassan
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy
Nicholas Davis
 
Security Handbook
 Security Handbook Security Handbook
Security Handbook
Anthony Hasse
 

Similar to Research and discuss an incident where it was discovered that a Remo.pdf (20)

Computing safety
Computing safetyComputing safety
Computing safety
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
 
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm IntelligenceOrder vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
The Other Side Of The Fence. Dealing With Hackers And Malware
The Other Side Of The Fence. Dealing With Hackers And MalwareThe Other Side Of The Fence. Dealing With Hackers And Malware
The Other Side Of The Fence. Dealing With Hackers And Malware
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
Spiffy Spyware Stuff
Spiffy Spyware StuffSpiffy Spyware Stuff
Spiffy Spyware Stuff
 
Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajali
 
RAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan BansalRAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan Bansal
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
Mitppt
MitpptMitppt
Mitppt
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy
 
Security Handbook
 Security Handbook Security Handbook
Security Handbook
 

More from fathimafancy

Write the program segment necessary to Test the C flag. i. If the .pdf
Write the program segment necessary to  Test the C flag.  i. If the .pdfWrite the program segment necessary to  Test the C flag.  i. If the .pdf
Write the program segment necessary to Test the C flag. i. If the .pdf
fathimafancy
 
Why must Group IV be treated with (NH4)2CO3 in basic solution What .pdf
Why must Group IV be treated with (NH4)2CO3 in basic solution What .pdfWhy must Group IV be treated with (NH4)2CO3 in basic solution What .pdf
Why must Group IV be treated with (NH4)2CO3 in basic solution What .pdf
fathimafancy
 
what is IOT what us SolutionAns. IOT stands for Internet of Th.pdf
what is IOT what us SolutionAns. IOT stands for Internet of Th.pdfwhat is IOT what us SolutionAns. IOT stands for Internet of Th.pdf
what is IOT what us SolutionAns. IOT stands for Internet of Th.pdf
fathimafancy
 
What is the difference between a BSS and a ESSSolutionBSS sta.pdf
What is the difference between a BSS and a ESSSolutionBSS sta.pdfWhat is the difference between a BSS and a ESSSolutionBSS sta.pdf
What is the difference between a BSS and a ESSSolutionBSS sta.pdf
fathimafancy
 
What is the role of capsid and nucleocapsid proteins during the life.pdf
What is the role of capsid and nucleocapsid proteins during the life.pdfWhat is the role of capsid and nucleocapsid proteins during the life.pdf
What is the role of capsid and nucleocapsid proteins during the life.pdf
fathimafancy
 
What distinguish between managerial and financial accounting as to (.pdf
What distinguish between managerial and financial accounting as to (.pdfWhat distinguish between managerial and financial accounting as to (.pdf
What distinguish between managerial and financial accounting as to (.pdf
fathimafancy
 
There is a lack of spirituality in a person that cheats because they.pdf
There is a lack of spirituality in a person that cheats because they.pdfThere is a lack of spirituality in a person that cheats because they.pdf
There is a lack of spirituality in a person that cheats because they.pdf
fathimafancy
 
select the answer a general search engine differs from a subject di.pdf
select the answer a general search engine differs from a subject di.pdfselect the answer a general search engine differs from a subject di.pdf
select the answer a general search engine differs from a subject di.pdf
fathimafancy
 
State briefly what functions an Engineering Services Department in a.pdf
State briefly what functions an Engineering Services Department in a.pdfState briefly what functions an Engineering Services Department in a.pdf
State briefly what functions an Engineering Services Department in a.pdf
fathimafancy
 
Satellites in geosynchronous orbit have the desirable property of re.pdf
Satellites in geosynchronous orbit have the desirable property of re.pdfSatellites in geosynchronous orbit have the desirable property of re.pdf
Satellites in geosynchronous orbit have the desirable property of re.pdf
fathimafancy
 
Please review the attached casescenario. You are Bill. Feel free to.pdf
Please review the attached casescenario. You are Bill. Feel free to.pdfPlease review the attached casescenario. You are Bill. Feel free to.pdf
Please review the attached casescenario. You are Bill. Feel free to.pdf
fathimafancy
 
Please make sure it works Ive been struggling with this and so far.pdf
Please make sure it works Ive been struggling with this and so far.pdfPlease make sure it works Ive been struggling with this and so far.pdf
Please make sure it works Ive been struggling with this and so far.pdf
fathimafancy
 
Please explain the physiological mechanism for enlarged lymph nodes..pdf
Please explain the physiological mechanism for enlarged lymph nodes..pdfPlease explain the physiological mechanism for enlarged lymph nodes..pdf
Please explain the physiological mechanism for enlarged lymph nodes..pdf
fathimafancy
 
multiple choiceAssuming that the probability for each shot is .pdf
multiple choiceAssuming that the probability for each shot is .pdfmultiple choiceAssuming that the probability for each shot is .pdf
multiple choiceAssuming that the probability for each shot is .pdf
fathimafancy
 
Mathematical Statistics.....Could answer be typed (is there any link.pdf
Mathematical Statistics.....Could answer be typed (is there any link.pdfMathematical Statistics.....Could answer be typed (is there any link.pdf
Mathematical Statistics.....Could answer be typed (is there any link.pdf
fathimafancy
 
Modify the Stack class given in the book in order for it to store do.pdf
Modify the Stack class given in the book in order for it to store do.pdfModify the Stack class given in the book in order for it to store do.pdf
Modify the Stack class given in the book in order for it to store do.pdf
fathimafancy
 
Let V be a finite dimensional vector space over F with T element (V,.pdf
Let V be a finite dimensional vector space over F with T element  (V,.pdfLet V be a finite dimensional vector space over F with T element  (V,.pdf
Let V be a finite dimensional vector space over F with T element (V,.pdf
fathimafancy
 
Java programI made this Account.java below. Using the attached cod.pdf
Java programI made this Account.java below. Using the attached cod.pdfJava programI made this Account.java below. Using the attached cod.pdf
Java programI made this Account.java below. Using the attached cod.pdf
fathimafancy
 
In the follwoing double bond hydration reaction styrene + water (so.pdf
In the follwoing double bond hydration reaction styrene + water (so.pdfIn the follwoing double bond hydration reaction styrene + water (so.pdf
In the follwoing double bond hydration reaction styrene + water (so.pdf
fathimafancy
 
Indicate whether each of the following items is an asset, liability,.pdf
Indicate whether each of the following items is an asset, liability,.pdfIndicate whether each of the following items is an asset, liability,.pdf
Indicate whether each of the following items is an asset, liability,.pdf
fathimafancy
 

More from fathimafancy (20)

Write the program segment necessary to Test the C flag. i. If the .pdf
Write the program segment necessary to  Test the C flag.  i. If the .pdfWrite the program segment necessary to  Test the C flag.  i. If the .pdf
Write the program segment necessary to Test the C flag. i. If the .pdf
 
Why must Group IV be treated with (NH4)2CO3 in basic solution What .pdf
Why must Group IV be treated with (NH4)2CO3 in basic solution What .pdfWhy must Group IV be treated with (NH4)2CO3 in basic solution What .pdf
Why must Group IV be treated with (NH4)2CO3 in basic solution What .pdf
 
what is IOT what us SolutionAns. IOT stands for Internet of Th.pdf
what is IOT what us SolutionAns. IOT stands for Internet of Th.pdfwhat is IOT what us SolutionAns. IOT stands for Internet of Th.pdf
what is IOT what us SolutionAns. IOT stands for Internet of Th.pdf
 
What is the difference between a BSS and a ESSSolutionBSS sta.pdf
What is the difference between a BSS and a ESSSolutionBSS sta.pdfWhat is the difference between a BSS and a ESSSolutionBSS sta.pdf
What is the difference between a BSS and a ESSSolutionBSS sta.pdf
 
What is the role of capsid and nucleocapsid proteins during the life.pdf
What is the role of capsid and nucleocapsid proteins during the life.pdfWhat is the role of capsid and nucleocapsid proteins during the life.pdf
What is the role of capsid and nucleocapsid proteins during the life.pdf
 
What distinguish between managerial and financial accounting as to (.pdf
What distinguish between managerial and financial accounting as to (.pdfWhat distinguish between managerial and financial accounting as to (.pdf
What distinguish between managerial and financial accounting as to (.pdf
 
There is a lack of spirituality in a person that cheats because they.pdf
There is a lack of spirituality in a person that cheats because they.pdfThere is a lack of spirituality in a person that cheats because they.pdf
There is a lack of spirituality in a person that cheats because they.pdf
 
select the answer a general search engine differs from a subject di.pdf
select the answer a general search engine differs from a subject di.pdfselect the answer a general search engine differs from a subject di.pdf
select the answer a general search engine differs from a subject di.pdf
 
State briefly what functions an Engineering Services Department in a.pdf
State briefly what functions an Engineering Services Department in a.pdfState briefly what functions an Engineering Services Department in a.pdf
State briefly what functions an Engineering Services Department in a.pdf
 
Satellites in geosynchronous orbit have the desirable property of re.pdf
Satellites in geosynchronous orbit have the desirable property of re.pdfSatellites in geosynchronous orbit have the desirable property of re.pdf
Satellites in geosynchronous orbit have the desirable property of re.pdf
 
Please review the attached casescenario. You are Bill. Feel free to.pdf
Please review the attached casescenario. You are Bill. Feel free to.pdfPlease review the attached casescenario. You are Bill. Feel free to.pdf
Please review the attached casescenario. You are Bill. Feel free to.pdf
 
Please make sure it works Ive been struggling with this and so far.pdf
Please make sure it works Ive been struggling with this and so far.pdfPlease make sure it works Ive been struggling with this and so far.pdf
Please make sure it works Ive been struggling with this and so far.pdf
 
Please explain the physiological mechanism for enlarged lymph nodes..pdf
Please explain the physiological mechanism for enlarged lymph nodes..pdfPlease explain the physiological mechanism for enlarged lymph nodes..pdf
Please explain the physiological mechanism for enlarged lymph nodes..pdf
 
multiple choiceAssuming that the probability for each shot is .pdf
multiple choiceAssuming that the probability for each shot is .pdfmultiple choiceAssuming that the probability for each shot is .pdf
multiple choiceAssuming that the probability for each shot is .pdf
 
Mathematical Statistics.....Could answer be typed (is there any link.pdf
Mathematical Statistics.....Could answer be typed (is there any link.pdfMathematical Statistics.....Could answer be typed (is there any link.pdf
Mathematical Statistics.....Could answer be typed (is there any link.pdf
 
Modify the Stack class given in the book in order for it to store do.pdf
Modify the Stack class given in the book in order for it to store do.pdfModify the Stack class given in the book in order for it to store do.pdf
Modify the Stack class given in the book in order for it to store do.pdf
 
Let V be a finite dimensional vector space over F with T element (V,.pdf
Let V be a finite dimensional vector space over F with T element  (V,.pdfLet V be a finite dimensional vector space over F with T element  (V,.pdf
Let V be a finite dimensional vector space over F with T element (V,.pdf
 
Java programI made this Account.java below. Using the attached cod.pdf
Java programI made this Account.java below. Using the attached cod.pdfJava programI made this Account.java below. Using the attached cod.pdf
Java programI made this Account.java below. Using the attached cod.pdf
 
In the follwoing double bond hydration reaction styrene + water (so.pdf
In the follwoing double bond hydration reaction styrene + water (so.pdfIn the follwoing double bond hydration reaction styrene + water (so.pdf
In the follwoing double bond hydration reaction styrene + water (so.pdf
 
Indicate whether each of the following items is an asset, liability,.pdf
Indicate whether each of the following items is an asset, liability,.pdfIndicate whether each of the following items is an asset, liability,.pdf
Indicate whether each of the following items is an asset, liability,.pdf
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 

Research and discuss an incident where it was discovered that a Remo.pdf

  • 1. Research and discuss an incident where it was discovered that a Remote Access Trojan (RAT) was found in a corporate network. How did the RAT infiltrate the network? What could have been done to protect the network from the RAT? How was the RAT detected? Solution RAT (Remote Access Trojan) -->Corporate networks are more vulnerable to RAT because of the classified files stored by these corporations some of which can be used by competitors to devise wining strategies. -->In our local branch, the company realized that there were times when stranger accessed the company’s networks and servers remotely. -->One of the main reason why RAT was suspected was the there were sensitive passwords that not many could easily find, but in the end it was realized that the key strokes of the general manager were logged by in a limited function Trojan that could easily be identities that may have been remotely downloaded . -->During the forensic investigation, it was realized that the malware also downloaded chat information from the chat servers, and unauthorized FTP malware. -->Finally, the system administrator also realized that there were constant complaints of a slow computers which means that the computing resources were being shared with unauthorized users while the authorized users though they were using legitimate software . -->Virtualization may be a new technique used by forensic investigators to identify the potential RAT program. -->The virtualization process involves using a virtual computers or partitioned hard disk to examine the behaviors of the malware and determine the files it can corrupt in a real system. -->For example, because the RAT was used to successfully exploit the vulnerabilities and deficiencies of the windows OS, windows OS can be virtualized to help identify the changed that the RAT can make to the registry file of the computer -->RATs are very common and designed to provide the attacker with complete control over the victim's system. -->They can be used to steal sensitive information, to spy on victims, and remotely control infected computers. -->RAT infections are typically carried out via spear phishing and social engineering attacks. Most are hidden inside heavily packed binaries that are dropped in the later stages of the malware’s payload execution. RATs have been a mainstay in cyber attackers’ tool kits for some time, they continue to be very
  • 2. challenging to detect for the following reasons: -->They open legitimate network ports on the infected machines. Since this is a very common operation, it appears benign to most security products. -->They mimic legitimate commercial remote administration tools. -->They perform very surgical operations that do not resemble common malware techniques.