The Threat Triplet: RATs, Keyloggers and Registry Keys—A Proof of Concept Analysis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In our globalized world, the danger of malware like Remote Access Trojans (RATs), Keyloggers, and Registry Keys is increasing. This paper aims to bring awareness on how these things can work together to do a lot of damage to individuals and organizations. With a proof-of-concept malware, we will illustrate how RATs compromise systems remotely. These RATs allow threat actors to get unauthorized access to critical systems. Keyloggers, on the other hand, work in the background, quietly recording important data like keyboard activity, passwords, credit card details, and confidential organizational information. Registry keys act as a supporting actor in this dangerous mix, giving the malware persistence. This paper also discusses strategies to detect and prevent the unholy trinity and emphasizes on a good cyber mentality to safeguard against these threats.

Original languageEnglish
Title of host publicationAdvances in Health Informatics, Intelligent Systems, and Networking Technologies - Proceedings of HINT 2024
EditorsAndrew Jeyabose, Andrew Jeyabose, Valentina Emilia Balas, Valentina Emilia Balas, Steven L. Fernandes
PublisherSpringer Science and Business Media Deutschland GmbH
Pages427-439
Number of pages13
ISBN (Print)9789819640072
DOIs
Publication statusPublished - 2025
EventInternational Conference on Health Informatics, Intelligent Systems, and Networking Technologies, HINT 2024 - Manipal, India
Duration: 13-03-202414-03-2024

Publication series

NameLecture Notes in Networks and Systems
Volume1286 LNNS
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389

Conference

ConferenceInternational Conference on Health Informatics, Intelligent Systems, and Networking Technologies, HINT 2024
Country/TerritoryIndia
CityManipal
Period13-03-2414-03-24

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Signal Processing
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'The Threat Triplet: RATs, Keyloggers and Registry Keys—A Proof of Concept Analysis'. Together they form a unique fingerprint.

Cite this