Nothing to do with Sacha Baron Cohen.
A remote access trojan, (RAT), is a holy grail of an infection for a hacker to get onto your system, as this powerful cyber crime tool allows full access and control of an infected system. Once a hacker has this much control they can do just about whatever they like!
The Borat RAT takes this to new levels. Among the dark capabilities being promoted by the black hat developers are:
- disable Microsoft Defender
- control the mouse and keyboard
- record video and audio – including screen captures of processes
- run a keylogger to record keystrokes,
- download saved credentials from web browsers
- compile code for Distributed Denial of Service attacks
- execute a ransomware campaign
- deliver ransomware, spyware or other malware the victim’s computer
- create and display the ransom demand.
Triple threat: Borat RAT pushes ransomware, DDoS, spyware • The Register
Remote Access Trojan adds ransomware and DDoS attacks to usual bag of tricks | TechRepublic
Awareness of the use made by hackers of email to deliver this type of payload to your computer is essential if you and your team are going to remain protected. This is where great training comes in: