Once inside a network, targeted attacks can use it as a highway to further a campaign. By using network traffic, coupled with threat intelligence, enterprise response teams can monitor and stop attacks before their respective attackers get away with their goal
RATs or remote access Trojans—like the prominent Gh0st, PoisonIvy, and DRAT—have made it easier for attackers to stay hidden within a target network. A RAT's ability to disguise their network traffic as messaging app traffic makes it especially elusive.