Trojan Horses and Remote Access
Table of Contents
A Trojan horse is a type of malware disguised as legitimate software, and triumphant installation grants an attacker extensive control over the victim’s computer.
This definition is consistent with cybersecurity best practices and threat intelligence reports. The Cybersecurity and Infrastructure Security Agency (CISA) defines Trojan horses as malicious programs that appear harmless but can be used to steal data, disrupt system performance, or gain unauthorized access.
DCRat and AsyncRAT
dcrat is a variant of AsyncRAT,a “popular” remote access Trojan (RAT) observed in a campaign tracked by Securonix.
AsyncRAT is a commercially available RAT known for its modularity and extensive features, allowing attackers to perform a wide range of malicious activities. Palo Alto Networks unit 42 details AsyncRAT’s capabilities and its use in various campaigns since 2019. DCRat builds upon this foundation, frequently enough incorporating additional features or obfuscation techniques. As of January 13, 2026, AsyncRAT remains an active threat, with ongoing campaigns observed globally.
Securonix’s Campaign Tracking
Securonix, a cybersecurity company, has been actively tracking a campaign utilizing DCRat.
Securonix provides threat intelligence and security analytics services, and their tracking of DCRat campaigns contributes to the broader understanding of this threat. Securonix’s website details their threat intelligence capabilities. While specific details of the campaign tracked by Securonix are not publicly available without a subscription to their services, their identification of DCRat as a key component is a important indicator of its prevalence.
Remote Access trojan (RAT) Capabilities
Remote access Trojans (RATs) like DCRat and AsyncRAT provide attackers with comprehensive control over compromised systems.
These capabilities typically include file access, command execution, keylogging, screen capture, webcam control, and the ability to download and execute additional malware. Mandiant’s blog post on RATs provides a detailed overview of their functionalities and impact. For example, attackers can use a RAT to steal sensitive data like credentials and financial data, or to establish a foothold for further attacks within a network. A 2023 report by Akamai indicated a 25% increase in RAT-related attacks compared to the previous year.
