Computer Services
  • Local Businesses Offer
  • Trusted Partners
  • Services & Solutions
  • Local Businesses Offer
  • Trusted Partners
  • Services & Solutions

Are you the victim of a RAT?

Now that we have your attention, let’s define what a RAT is.

RAT stands for Remote Administration Tool (are you getting the picture yet?)

A hacker can infect your machine with a RAT, or a program, that gives them complete control over your laptop or desktop computer. Yes, complete control that would include your web camera and microphone. So you may not be alone in the privacy of your home anymore. In fact, people may be watching everything you do and listen to everything you say when your computer is turned on.

The RAT console allows the hacker to easily rifle through your personal files and stalk you while are doing whatever you do on your computer. In fact most o the RATters are male and are looking for “Girl Slaves” to watch in real-time or download their personal pictures they may have stored on their computer.

Here are some of the tools used to become a Ratter:

  • * BackOrifice
  • * DarkComet
  • * BlackShades

The Bad News:
Unfortunately your anti-virus/anti-malware program can’t protect you all the time. The hackers have been able to tailor their programs in a way that is not detectable.

The Good (or better) News:
Ratters need to infect your machine and the common way to do this is using file-sharing networks. So if you don’t frequent file sharing or torrent sites the risk of infection is pretty low. Other ways to get your computer infected is through messaging via social media.

For now you can tell if you are being spied on if your webcam has a light and it turns on when in use. Currently the Ratters are trying to find a way to disable the light so they go undetected.

The best advice we could give at this time has been around for a long time:

  • * Do not open email attachments from people you do not know
  • * Do not visit shady forum sites
  • * Do not download files and torrents from file-sharing and torrent sites

Read the complete article and see some fascinating screen captures.

Posted: 3/18/2013 6:44:54 PM by Proxy Consulting | with 0 comments
Filed under: BackOrifice, BlackShades, DarkComet, Hackers, Malware, RAT, Remote Administration Tool, Spyware
Trackback URL:

Blog post currently doesn't have any comments.

Blogging Technology

Kentico CMS, WordPress, C#, ASP.NET, Windows Server, Windows, SQL Server, Computer Security and other technology related articles.


A blog about technology in general and how-to articles.