Z7_3OKIGJ82OO5F90QN9UNJV0G0V6
Z7_3OKIGJ82OO5F90QN9UNJV0G0V5

This malware disguises itself as a program or application

Remote access trojans (RAT) are a type of malware disguises itself as a well-known program or application that works in the background, creating a remote path for accessing your devices and the information they host, without raising suspicions.

How does this happen?

In most cases, you are tricked into installing it yourself. Below are a few of the most common tactics used to trick you:

  • Asking you to click on a link or download malicious files, programs or apps, for example: showing you a message inviting you to install an outstanding update.
  • They are hidden in free software on a disreputable website.
  • Gaining your trust on a phone call. For example: somebody passes themselves off as IT support, offering you help to install a new application.

Malware can also infect your business' devices by exploiting a security breach or weakness in your systems.

Minimise the risks

  • Only download software and apps from trusted websites, for example, official app stores and websites.
  • Think before you click , on an email, message and pop-up.
  • Keep operating systems, software, programs and apps up to date.

¿Qué hacer si te ves afectado por un RAC?

  • Check whether programs have been installed recently and if you don't recognise any, delete them.
  • Perform a comprehensive security analysis on all devices and online, not just on those affected.
  • As an additional measure, consider restoring the manufacturer's original settings and restore the information from a clean backup, or consider whether you need to check whether the device is safe to use with an IT services supplier.
  • Change the passwords for your accounts and profiles, including online banking.
  • Control your bank accounts and card transactions. To help you remember that you can configure alerts.
Z7_3OKIGJ82OO5F90QN9UNJV0GOI3
${loading}
×