How this affects you
- When deploying a RAT, a hacker's primary goal is to create a backdoor to infected systems so they can gain complete control over that system.
- When a RAT is installed on your system, the attacker is then able to view, change, or manipulate data on the infected machine. This leaves you open to your, and possibly your clients', sensitive data being stolen.
- Often, a single RAT is deployed as a pivot point to deploy additional malware in the local network or use the infected system to host malware for remote retrieval.