T1219 Remote Access Tools Technique Explained

Sıla Özeren Hacıoğlu | 2 MIN READ

| February 23, 2026

What Is T1219 Remote Access Tools in MITRE ATT&CK?

T1219 Remote Access Tools (RATs) is a MITRE ATT&CK technique used by adversaries to establish remote command and control channels within a compromised environment. RATs include both software and hardware-based tools that enable attackers to remotely control compromised systems. These tools allow attackers to interact with target machines as if they were physically present, bypassing many security defenses and providing direct access to internal networks and systems.

RATs can operate through a variety of methods, including graphical remote desktop interfaces, command-line remote management, protocol tunneling via development tools, and even hardware-level access like KVM over IP(Keyboard, Video, Mouse). By leveraging trusted communication methods typically used by IT administrators, adversaries can blend their malicious activities into normal network traffic, making detection more challenging.

Adversary Use of T1219 Remote Access Tools

Adversaries use T1219 Remote Access Tools to gain and maintain persistent, interactive control over compromised environments. By exploiting legitimate RATs or custom tools, attackers can set up a covert command and control channel that mimics legitimate administrative or troubleshooting tasks, making it difficult for security systems to differentiate between malicious and benign activities.

Once in place, adversaries typically use RATs to:

  • Establish interactive command and control channels, which closely resemble authorized remote administration activity, allowing them to execute commands, steal data, or deploy additional payloads.
  • Maintain persistent or redundant access, ensuring they can re-enter a compromised environment if other access methods are disrupted or detected.
  • Leverage pre-existing remote access functionalities embedded in legitimate software or malware, providing seamless, undetected backdoor access that persists across system reboots and other disruptions.

For example, attackers often use RATs after initial compromise to maintain control over a system, with many RATs registering themselves as Windows services or utilizing embedded persistence mechanisms that ensure they re-establish their connection upon reboot. Additionally, hardware-based RATs, such as KVM over IP, allow adversaries to bypass software-based security tools completely by operating at the BIOS or firmware level.

By exploiting remote access tools, adversaries can operate with the same user permissions as legitimate administrators, allowing them to evade detection and maintain control for extended periods, making RATs a key tool for long-term, stealthy intrusions.

Why T1219 Matters: Red Report 2026 Context

While Remote Access Tools (T1219) did not appear in the top ten of the Red Report 2024 or 2025, its first appearance in three years in the Red Report 2026 highlights a growing adversary focus on access continuity, achieved by blending into normal administrative activity to support prolonged espionage, lateral movement, and follow-on operations.

Sub-Techniques of T1219 Remote Access Tools

The Remote Access Tools technique consists of 3 sub-techniques in MITRE ATT&CK v18.

This blog serves as a hub page for the T1219 Remote Access Tools technique within the MITRE ATT&CK framework. Each linked sub-technique page explains how the technique works, details adversary behavior, and includes real-world procedure examples observed in the wild, as documented in the Red Report.

  • T1219.001 IDE Tunneling in MITRE ATT&CK Explained
  • T1219.002 Remote Desktop Software in MITRE ATT&CK Explained
  • T1219.003 Remote Access Hardware in MITRE ATT&CK Explained

Validate Your Defenses Against the Red Report 2026 Threats

 

Table of Contents

Ready to start? Request a demo