1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

How to kill Remote Access Trojans

Discussion in 'Network World' started by RSS, Aug 4, 2015.

  1. RSS

    RSS New Member Member

    Detecting Remote Access Trojans can be very challenging because they mimic legitimate commercial remote administration tools, open legitimate network ports, and perform very surgical operations that don’t resemble typical malware techniques, says Udi Shamir, CSO and head of SecurityLabs, SentinelOne.

    No doubt this stealth aided attackers who used the Carbanak malware RAT, which, according to “Carbanak APT: The Great Bank Robbery”, February 2015, Kaspersky Labs, infected banks globally, stole funds, and wreaked financial havoc estimated at up to $1 billion in losses.

    To deal with these low-down, filthy, social-engineering, vulnerability-crawling varmints, you’ll need to learn their aliases, profile their capabilities, and uncover how to block, starve, and blind them before blowing them away.

    To read this article in full or to leave a comment, please click here

    (Insider Story)

    Continue reading...
     

Share This Page