A remote access tool or RAT, clandestinely installed on your system could wreak havoc and completely immobilise your business.
Tool or Trojan?
RAT can also stand for remote administration tool, but it is often referred to as a remote access Trojan, especially when installed silently and with malicious intent, as a back door into your system.
Malware attached to an email, embedded in a website or even spread via a USB drive, can install a RAT. Your security software may not detect them, and you probably won’t know about them. They remain invisible, allowing bad actors to pursue their aims unnoticed.
Risky Old Tools
A potential RAT can even be left behind by a well-meaning service provider, presenting a loss of control and a grave risk. Many times I’ve been called in to a new client to find 5 or 6 RAT’s installed on the system by long-forgotten support technicians: the phone guy, the alarm guy, the line-of-business application helpdesk, prior IT service providers, etc.. People move on; businesses move on. Do you even know who has access to your system?
A criminal can use a RAT to move laterally through your system, to steal data, plant ransomware or add your network to a malicious botnet used to bring down larger systems, distribute malware or mine crypto currency. Your system might be used as a staging point for an attack on one of your customers’ or suppliers’ systems.
Such events could bring your business activities to a halt, ruin your reputation and destroy your business.