Cybersecurity Reference > Glossary
What is a Remote Access Trojan (RAT)?
Once installed, it runs quietly in the background, letting the attacker see what's on your screen, access your files, turn on your webcam or microphone, log your keystrokes, and essentially do anything you could do sitting at the keyboard.
The "trojan" part of the name comes from the Greek myth—these programs sneak onto systems disguised as legitimate software, or they slip in through security holes without the user knowing anything happened. Unlike viruses that spread themselves or ransomware that announces its presence, RATs are designed for stealth.
An attacker might maintain access for months, watching and waiting, stealing data bit by bit, or using the compromised machine as a launching point for attacks deeper into a network. They're a favorite tool of both sophisticated state-sponsored hackers and cybercriminals, since they offer such complete control with relatively low risk of detection if deployed carefully.
Origin
Through the 2000s, RATs evolved from crude proof-of-concept tools into sophisticated malware. SubSeven, Poison Ivy, and DarkComet became staples of cybercrime, offering increasingly user-friendly interfaces that let even non-technical criminals deploy them.
By the 2010s, state-sponsored groups were using custom RATs for espionage—tools like Gh0st RAT and PlugX appeared in campaigns attributed to nation-state actors. The commercialization of RATs as "remote administration tools" created a gray market where the same software could be legitimately used by IT departments or illegitimately deployed by attackers.
Why It Matters
The tools themselves have become easier to use—some are sold as malware-as-a-service, requiring no technical expertise to deploy. Detection is challenging because modern RATs use encryption, hide in legitimate system processes, and communicate with command-and-control servers in ways that mimic normal internet traffic.
For individuals, RATs enable identity theft, financial fraud, and disturbing privacy violations including webcam and microphone surveillance. The shift to remote work has expanded the attack surface, as home networks and personal devices often lack the security controls of corporate environments.
The Plurilock Advantage
We help organizations implement zero-trust architectures that limit the damage even if a RAT gains a foothold, and our incident response team has deep experience extracting attackers from compromised environments and hardening systems against reinfection.
When it comes to RATs, speed matters—we mobilize in days, not weeks.
.




