Summary

  • Remote Access Trojans (RATs) and kernel-level rootkits are examples of malware designed to give bad actors remote access to a victim’s PC, but they can be difficult to detect as they often operate silently in the background.
  • There are several signs that could suggest remote access is taking place, such as unusual mouse/keyboard activity, programs opening and closing by themselves, the creation of unknown user accounts, and slow performance.
  • To check if remote access is happening, visit Windows Event Viewer and look for logs related to RDP and login, track network traffic using tools such as GlassWire, and look out for suspicious tasks in the Task Scheduler.
  • If any of these are found, take steps to confirm they are revoked and implement steps to bolster security going forwards, such as resetting important account passwords, backing up important data, and running Microsoft Defender offline scan, removing any suspicious programs, blocking inbound remote access ports in the firewall, or even doing a clean Windows install.
  • Suspicious local access should also be investigated and security measures stepped up.

By Karrar Haider

Original Article