The Handler
“Remote Access Trojan”
The rat announces itself. Twelve feet of inflatable vinyl, claws raised, teeth bared — planted on the sidewalk in front of whoever crossed the union. You could see it from a block away. You were supposed to.
In security, a RAT does the opposite. Remote Access Trojan: deployed quietly, maintained invisibly, operated from somewhere the camera never reaches. The implant looks like nothing — a process name that blends in, a connection that mimics normal traffic, presence without announcement.
But the structure is the same. Both require a handler. Both persist until someone decides to pull them. The man in the frame is not the threat. He is the operator. The rat does nothing on its own. Neither does the malware.
The difference is intent around visibility. The union rat works because you see it. The network rat works because you don't. One is a declaration. The other is a secret that has already been kept for six months before anyone thinks to look.
The rat stays up because someone is maintaining it. In a network intrusion, that maintenance is a command and control (C2) channel — the persistent connection between the implant and the operator. Cut the power, the rat deflates. Sever the C2, the RAT goes silent.
Both have been running longer than anyone wanted.
Exposed