test_RAT() function tests your network’s ability to detect connections to unsanctioned remote desktop management tools. While tools like TeamViewer and AnyDesk have legitimate uses, threat actors frequently abuse them for persistence and data exfiltration.
Security Context
Unsanctioned remote desktop tools are increasingly used by threat actors because:- They appear as legitimate software to security tools
- They provide persistent remote access
- They can exfiltrate data through encrypted tunnels
- They bypass traditional malware detection
- They’re difficult to distinguish from authorized usage
Tested Remote Desktop Tools
This module tests connections to domains associated with popular remote desktop software:TeamViewer
teamviewer.comrouter1.teamviewer.comudp.ping.teamviewer.com
AnyDesk
boot.net.anydesk.comrpm.anydesk.comrelay-a7a47b7c.net.anydesk.com
Splashtop
splashtop.comsdrs.splashtop.comst2-v3-dc.splashtop.com
LogMeIn
update.logmein.comlmi-app22-01.logmein.comsecure.logmeinrescue.com
ScreenConnect
screenconnect.comserver-nix4beff1f3-web.screenconnect.cominstance-ra153n-relay.screenconnect.com
GoToAssist
gotoassist.com
Functional URLs sourced from Netify application detection database: https://www.netify.ai/resources/applications
How It Works
Output Format
Results are saved to RAT_Results.txt with the following format:What to Monitor
Application Control
Monitor for installation and execution of unauthorized remote desktop applications on endpoints.
Network Traffic
Track connections to remote desktop domains and unusual data transfer volumes.
DNS Queries
Log DNS queries to remote desktop service domains for unauthorized usage detection.
User Behavior
Correlate remote desktop usage with user accounts and expected business activities.
Threat Actor Tactics
Initial Access
Initial Access
Attackers may:
- Trick users into installing remote desktop tools via phishing
- Include RDP tools in malware payloads
- Use social engineering to gain installation approval
- Exploit vulnerabilities to deploy remote access tools
Persistence
Persistence
Remote desktop tools provide persistent access:
- Survive system reboots
- Appear as legitimate software
- Maintain access even if initial malware is removed
- Enable long-term network presence
Data Exfiltration
Data Exfiltration
Tools enable data theft through:
- File transfer capabilities
- Clipboard synchronization
- Screen capture and recording
- Encrypted tunnels bypassing DLP
Lateral Movement
Lateral Movement
Attackers use remote access to:
- Move between systems in the network
- Access sensitive resources
- Deploy additional malware
- Escalate privileges
Legitimate vs. Malicious Usage
Many organizations legitimately use remote desktop tools for:
- IT support and helpdesk operations
- Remote work enablement
- Third-party vendor access
- System administration
- Authorized and documented
- Monitored and logged
- Subject to security policies
- Limited to approved tools only
Testing Workflow
Security Policy Recommendations
Implement Controls
- Block unauthorized RDP tools at the firewall
- Use application control to prevent installation
- Monitor DNS queries to RDP service domains
- Require approval workflow for remote access
Monitor Usage
- Log all remote desktop connections
- Alert on unauthorized tool usage
- Track data transfers during remote sessions
- Review access patterns regularly
Security Controls to Validate
- Application Whitelisting - Block execution of unauthorized remote desktop software
- DNS Filtering - Monitor and control DNS queries to remote desktop domains
- Firewall Rules - Block network connections to unauthorized RDP services
- Endpoint Detection - Alert on installation of remote access tools
- Network Analysis - Detect unusual remote desktop traffic patterns
- User Activity Monitoring - Track remote sessions and data transfers
Incident Response
If unauthorized remote desktop tools are detected:- Isolate - Disconnect affected systems from the network
- Investigate - Determine who installed the tool and when
- Analyze - Review logs for data exfiltration or malicious activity
- Remediate - Remove unauthorized software and block domains
- Document - Record findings for security improvement