{"id":97697,"date":"2021-08-31T18:29:31","date_gmt":"2021-08-31T18:29:31","guid":{"rendered":"https:\/\/feedzai.com\/?post_type=resource&p=97697"},"modified":"2023-01-19T16:23:56","modified_gmt":"2023-01-19T16:23:56","slug":"how-to-detect-and-prevent-remote-trojan-access-attacks","status":"publish","type":"resource","link":"https:\/\/feedzai.com\/resource\/how-to-detect-and-prevent-remote-trojan-access-attacks\/","title":{"rendered":"How to Detect and Prevent Remote Trojan Access Attacks"},"content":{"rendered":"

[vc_row row_height_percent=”0″ back_color=”color-116710″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″][vc_column column_width_percent=”100″ gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/1″][vc_row_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″][vc_custom_heading text_color=”color-200866″ text_size=”fontsize-554605″ text_weight=”600″]Solution Sheet[\/vc_custom_heading][vc_custom_heading text_color=”color-853579″ heading_semantic=”h1″ text_weight=”700″ uncode_shortcode_id=”163659″ text_color_type=”uncode-palette”]How to Detect and Prevent Remote Trojan Access Attacks<\/span>[\/vc_custom_heading][vc_button button_color=”color-142326″ size=”btn-lg” radius=”btn-circle” border_width=”0″ link=”url:%2Faptopees%2F2021%2F09%2FFeedzai_Solution_Sheet_Remote_Access_Trojan_Detection_Prevention.pdf|target:_blank” button_color_type=”uncode-palette” uncode_shortcode_id=”956721″]Download Now[\/vc_button][\/vc_column_inner][vc_column_inner width=”1\/2″][vc_single_image media=”97865″ media_width_percent=”100″ uncode_shortcode_id=”195275″][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column width=”2\/12″][\/vc_column][vc_column column_width_percent=”100″ gutter_size=”3″ overlay_alpha=”50″ border_color=”color-gyho” border_style=”solid” shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”8\/12″ css=”.vc_custom_1621607899549{padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 45px !important;padding-left: 30px !important;}”][vc_column_text uncode_shortcode_id=”590574″]Cybercriminals use Remote Access Trojans (RATs) to either access a customer\u2019s device or account or commit fraud by hijacking a legitimate user\u2019s banking session. RATs can go undetected by anti-virus software and two-factor (2FA) solutions.\u00a0<\/span><\/p>\n

The Fraud Detection and Response Platform (FDR) from Revelock, a Feedzai company, protects web and mobile banking apps by detecting RATs and stops them from hijacking user sessions or taking over online accounts or connected devices. Download our solution sheet to learn how the FDR platform:<\/span><\/p>\n