A malicious program that remotely accesses infected resources.
Trojans of this type are among the most dangerous because they open up all kinds of opportunities for remote control of the compromised system.
RAT capabilities usually include program installation and removal, file manipulation, reading data from the keyboard, webcam hijacking, and clipboard monitoring.