Learning Library

← Back to Library

Remote Access Trojan Scam Explained

Key Points

  • The segment begins by exposing a common tech‑support scam where impostors pose as “John” and push malicious “disinfection” software that actually installs a Remote Access Trojan (RAT).
  • A RAT is explained as a Trojan‑type malware that lets an attacker remotely control a computer, capture keystrokes, view the screen, access files, inject additional malware, and even activate webcams and microphones.
  • While legitimate remote‑access tools exist for help‑desk troubleshooting, when abused by malicious actors they become dangerous RATs, granting total control over the victim’s system.
  • The primary infection method described is social engineering: attackers create fear, uncertainty, and doubt (FUD) and a false sense of urgency to trick users into downloading and executing the malicious software without critical thinking.

Full Transcript

# Remote Access Trojan Scam Explained **Source:** [https://www.youtube.com/watch?v=zTxuuYayUag](https://www.youtube.com/watch?v=zTxuuYayUag) **Duration:** 00:08:51 ## Summary - The segment begins by exposing a common tech‑support scam where impostors pose as “John” and push malicious “disinfection” software that actually installs a Remote Access Trojan (RAT). - A RAT is explained as a Trojan‑type malware that lets an attacker remotely control a computer, capture keystrokes, view the screen, access files, inject additional malware, and even activate webcams and microphones. - While legitimate remote‑access tools exist for help‑desk troubleshooting, when abused by malicious actors they become dangerous RATs, granting total control over the victim’s system. - The primary infection method described is social engineering: attackers create fear, uncertainty, and doubt (FUD) and a false sense of urgency to trick users into downloading and executing the malicious software without critical thinking. ## Sections - [00:00:00](https://www.youtube.com/watch?v=zTxuuYayUag&t=0s) **Tech Support Scam & RAT Warning** - The segment exposes a fraudulent “technical support” ploy that installs a Remote Access Trojan, explaining how RATs masquerade as helpful software and detailing the extensive control they give attackers over a victim’s computer. - [00:03:03](https://www.youtube.com/watch?v=zTxuuYayUag&t=183s) **User Self-Infection via Social Engineering** - The speaker explains how users unwittingly install remote access malware through malicious sites, fake antivirus pop‑ups, and phishing emails. - [00:06:07](https://www.youtube.com/watch?v=zTxuuYayUag&t=367s) **Validate Calls, Secure Software Access** - The speaker advises treating unsolicited calls as suspicious, confirming contact numbers independently, downloading software only from trusted sources, employing antivirus/EDR tools, and enabling multi‑factor authentication to prevent RAT compromises. ## Full Transcript
0:00Hello, this is John from Technical Support. 0:03We see some unusual activity on your computer and we think you may be infected with the virus. 0:08But don't worry, we have special disinfection software. 0:11Go to this website, download that, and it will help you clean your system. 0:16Only problem with that scenario 0:18is I'm not from technical support. 0:21There's no virus on your computer. 0:23In fact, my name is not even John. 0:25And in fact, that special disinfection 0:27software -- that's about to make things worse. 0:30Let's take a look. 0:33Okay, what just happened there? 0:35Well, you've been hit by a RAT and a bad one. 0:38And yes, there are, in fact, good ones. 0:40But we're going to talk about the bad ones in this video. 0:42What's a RAT? Well, it's a Remote Access Trojan. 0:47A trojan is short for Trojan horse. 0:49It's basically a piece of malware that's wrapped inside another piece of software. 0:54So maybe it's a program that proclaims to do something good or harmless or entertaining. 0:59But in fact, there's bad stuff inside it. 1:02A remote access refers to the fact 1:05that a bad guy is going to be able to remotely control your system. 1:09So here's our bad guy and what he's going to be able to do once he has 1:13the RAT installed on your system, that special software, 1:17he's going to be able to see everything you type on your keyboard, including all your passwords. 1:22In fact, he can even type things in as if you had typed them in--complete control. 1:27He's going to see everything that comes up on your monitor. 1:30So all the sensitive, confidential information you might be reviewing--not only today, 1:35but a week from now, you'll still be able to see everything that you see. 1:39You'll be able to have direct access to your disk. 1:42You'll be able to put malware on there, maybe ransomware, maybe encrypt all your files 1:48and make you pay him in order to get that information back--or just delete it all. 1:53He's going to have access to your webcam 1:56and to the microphone on your laptop. 2:00How about that for creepy? 2:02In other words, he can turn these things on even when you're not aware of it 2:05and see everything you do and listen to everything you say. 2:09That's what a remote access trojan would do. 2:12There's other things called remote access tools that can be used by Help Desk for legitimate reasons 2:17in order to do a couple of these kinds of things, to see what's 2:20working on your system and help you diagnose the problem. 2:23But in the hands of a wrong actor, 2:27this becomes a RAT, a trojan. 2:29And this guy has complete control over your system. 2:33Okay, let's see how these different types of infections 2:37can occur where you become infected with a RAT. 2:40So the first one we already took a look at. 2:43This is basically a social engineering attack. 2:45And in this case, the bad guy is going to call this guy. 2:49And when he does, he's going to instill in him a sense of fear, 2:54uncertainty and doubt. FUD. 2:56There's going to be a sense of urgency. 2:58You need to do something now because we don't want you to stop and really think about this. 3:02We want you to just act. 3:03And what this guy is going to do is go on to his laptop. 3:07He's going to go over to the site that is controlled by the bad guy. 3:11He's going to download this stuff and now his system is infected with the RAT. 3:16And this guy has complete control over his system. 3:19Let's take a look at another example. 3:21How about a pop up occurs? 3:24This guy is on his laptop, minding his own business, surfing the web, 3:28and all of a sudden a pop up appears on his system. 3:32And the pop up gives him instructions. 3:34The instructions could be that he just goes to this site and downloads 3:39the disinfection software because it's telling him “you've got a virus.” And by the way, 3:44this is from some well-known antivirus company that it claims to be that it really isn't. 3:50Or it could be that it tells him to use his phone and call. 3:54And then the person he calls leads him through the same type of scenario, 3:59but the same results occur in both of these. 4:02The pop up is just the way to initiate the action. 4:05But the user is actually infecting themself in both of these cases. 4:10And then one more that we'll take a look at is a more silent kind of case. 4:16In this case, 4:17they're going to get an email--it’s going to come from the bad guy into his system. 4:22And this email is like a phishing email or something of that sort. 4:26And it's going to tell him to click on a link. 4:28It may not tell him that he's been infected, or it might, it could be either one of these circumstances. 4:33It could say that it's coming from his bank and he needs to install new software in order to access his account. 4:39Or it could say we're from such and such 4:42antivirus company or such and such operating system company, 4:45and we found the virus and we need you to install the software. 4:49Once again, same scenario. 4:51He goes over to the bad guy’s site, downloads 4:54an app, downloads software, and now he's under complete control. 4:58This guy now has a command and control server that allows him to do whatever he wants on the good guy’s system. 5:06Okay, so what can you do to prevent this from happening to you? 5:10Well, there's a lot of things. In fact, that's the good news. 5:12First and most important, have a good backup. 5:15If everything else fails, you want to be able to go to your backup and recover. 5:19So make sure you have that. Do that now. 5:22Next thing is, make sure that you patch your systems. 5:25I know it's inconvenient sometimes to stop what you're doing and put on all of those 5:29vendor patches from all the different apps and all the different OSes. 5:33But if you don't, there may be a vulnerability that the bad guy is going to exploit 5:38that gives him the remote access trojan capability onto your system. 5:42Another one is learn the tactics, techniques and procedures (TTPs) of the bad guys. 5:47In other words, how do they go about doing what they do? 5:50If you understand how your adversary works, then you'll have a much better 5:53idea of how to avoid what they do and you won't fall victim to it. 5:57So be aware. 5:58Educate yourself. 6:00Then, if you do think you need to call tech support for a problem. 6:04If they call you and report that they found an issue. 6:07I'm going to tell you, first of all, generally operating 6:10system companies do not call customers out of the clear blue. 6:14So you should suspect that something is up. 6:17Neither do application vendors for the most part either. 6:19So if you do think for some reason you want to check this out, say, 6:24“Okay, I'll give you a call back,” and don't take the number that they tell you. 6:28Then you go and look up the number for that company and you call them directly and then you can find out. 6:34So you do a separate call that you've initiated and you know where you're actually calling. 6:40Get all of your software from trusted sources. 6:43Don't go to just any old app store and download stuff 6:46because that may have a trojan inside it and you may have just infected yourself. 6:51So as best possible, know that your software comes from trusted sources. 6:58Use antivirus, endpoint detection and response software. 7:02The EDR stuff is used more in enterprise environments, AV, 7:06very common on user retail systems. 7:10But use these technologies because they can sometimes detect 7:14these RATs, the well-known ones, and stop them in their tracks. 7:17And then as another sort of safety measure, use multi-factor authentication on all of your accounts. 7:23Don't let it just be a user ID and password that gets you in 7:26because the guy controlling the RAT may-- 7:29remember --control your keyboard and when you type in your password, they get your password. 7:34Then they can log in as you. 7:35But if they also need to have possession of your phone 7:39in order to get your biometric to open the phone up or to get into the app, 7:44you know, with an SMS message that goes to your phone, it makes it harder for them. 7:48Now, of course, they could have a RAT on your phone as well. 7:51So there's a lot of different things that could be involved here. 7:54But multi-factor authentication certainly makes the job harder for the bad guy. 7:59And then one of the other things you could do is basically turn off the camera or put a block, put a 8:07piece of tape, put something over the webcam on your laptop and only take it off when you plan to use it. 8:13That way, if someone is on your system, then they won't be able to see anything 8:18and you'll have at least a little more peace of mind in that case. 8:21They actually make little devices that you can stick on that allow you to slide and open and close the camera. 8:27So look for that kind of capability as well. 8:29So there's a lot of things you can do here. 8:31That's the good news. 8:33And I'll just say, if John from Tech Support 8:35gives you a call, best thing you could do, just hang up. 8:39Don't get infected by a RAT. 8:42Thanks for watching. 8:43If you like this video, please like and subscribe. 8:46And don't forget to hit the notify button so that you'll be aware of other videos like this when they come out.