A RAT is another type of malware program that allows hackers to assume remote control over a device. Once the cyber-criminal has connected the RAT program to a target, they can access, manipulate and exploit local files and acquire user credentials and other confidential information. There are many ways that hackers can use this control, such as spreading viruses to other devices within a network. Like any other malware, attackers attach a RAT to files that may appear legitimate, such as downloadable software or emails. What makes RATS highly useful to hackers and significantly risky to users is their ability to imitate above-board remote access applications and programs.