Once inside a network, targeted attacks can use it as a highway to further a campaign. By using network traffic, coupled with threat intelligence, enterprise response teams can monitor and stop attacks before their respective attackers get away with their goal
RATs or remote access Trojans—like the prominent Gh0st, PoisonIvy, and DRAT—have made it easier for attackers to stay hidden within a target network. A RAT's ability to disguise their network traffic as messaging app traffic makes it especially elusive.
Though phishing threats are typical on the Internet, the danger of spear-phishing attacks shouldn’t be downplayed. Sixty-five government entities have been exposed to spear-phishing—still the favored attack method because of its continued success in tricking