Remote access trojans (RAT) – Banco SantanderDiscover what remote access Trojans are, how they are rolled out, how to minimise the risks and what to do if you have been affected.
topbar empresas españa

Online Security

Remote access trojans (RAT)

This type of malware seeks to open a gateway to your business information, without you realising

This malware disguises itself as a program or application

Remote access trojans (RAT) are a type of malware disguises itself as a well-known program or application that works in the background, creating a remote path for accessing your devices and the information they host, without raising suspicions.

How does this happen?

In most cases, you are tricked into installing it yourself. Below are a few of the most common tactics used to trick you:

  • Asking you to click on a link or download malicious files, programs or apps, for example: showing you a message inviting you to install an outstanding update.
  • They are hidden in free software on a disreputable website.
  • Gaining your trust on a phone call. For example: somebody passes themselves off as IT support, offering you help to install a new application.

Malware can also infect your business' devices by exploiting a security breach or weakness in your systems.

Minimise the risks

  • Only download software and apps from trusted websites, for example, official app stores and websites.
  • Think before you click, on an email, message and pop-up.
  • Keep operating systems, software, programs and apps up to date.

What to do if you are affected by a RAC?

  • Check whether programs have been installed recently and if you don't recognise any, delete them.
  • Perform a comprehensive security analysis on all devices and online, not just on those affected.
  • As an additional measure, consider restoring the manufacturer's original settings and restore the information from a clean backup, or consider whether you need to check whether the device is safe to use with an IT services supplier.
  • Change the passwords for your accounts and profiles, including online banking.
  • Control your bank accounts and card transactions. To help you remember that you can configure alerts.

Don't miss this

CEO fraud

Targeted and more difficult to detect, this type of phishing poses a threat to companies of all sizes.

Supply chain attacks

SMEs might be subject to cyberattacks as a way of accessing their customers or suppliers.

Working securely from home

Help your customers maintain an appropriate level of security, no matter where they are working from.