
# It is much easier to keep track of the computers the RAT is installed on, since they are all "calling home" by connecting to the remote administrator. # Since the remote's computer is connecting to the remote administrator, one does not need to know the remote's IP address in order to connect.

# Outgoing connections generally are less treating, and are less likely to be detected or blocked by a firewall, such as a router.

Reverse Connection : Some of the listed advantages of a reverse connection. Multi-Threaded : allowing for multiple clients to be connected, along with increased reliability.

Automatically map ports if your router supports uPnP It can also be used as a monitoring device for detecting unauthorized access.ĬyberGate achieves this though it's abundant array of features.

In addition, it can also log keystrokes of the infected systems.CyberGate is a powerful, fully configurable and stable Remote Administration Tool coded in Delphi that is continuously getting developed by our experienced team.ĬyberGate was built to be a tool for various possible applications, ranging from assisting Users with routine maintenance tasks, to remotely monitoring your Children, captures regular user activities and maintain a backup of your typed data automatically. This malware family of backdoors has the capability to receive commands such as File Management (Download, Upload, and Execute Files), Registry Management (Add, Delete, Query, and Modify Registry), Perform Shell Command, Computer Control (Shutdown, Log on/off), and Screen capture from a remote attacker. This RAT has been used in attacks targeting Israeli and Syrian governments last 2012. According to Trend MIcro, Extreme RAT (XTRAT, Xtreme Rat) is a Remote Access Trojan that can steal information.
