Jump to content

Backdoor: Difference between revisions

From Consumer Rights Wiki
Banana (talk | contribs)
Added archive URLs for 1 citation(s) using CRWCitationBot
Proprietary was written wrong.
Tags: Mobile edit Mobile web edit Visual edit
Line 8: Line 8:
A backdoor malware is a software that, when executed installs a backdoor into the system that executed it.<ref name=":0" /> This is often referred to as a ''Trojan''. These often use an unpatched exploit to gain access to the system.
A backdoor malware is a software that, when executed installs a backdoor into the system that executed it.<ref name=":0" /> This is often referred to as a ''Trojan''. These often use an unpatched exploit to gain access to the system.


'''Propriatary backdoors'''  
'''Proprietary backdoors'''  


A propriatary backdoor is a built-in backdoor; A backdoor that was intentionally placed there.<ref name=":0" /> These backdoors can be used for good or bad purposes. Some may exist for testing purposes. However, if left in the final product, may be susceptible to exploitation. Other built-in backdoors are used by the company for nefarious purposes.  
A propriatary backdoor is a built-in backdoor; A backdoor that was intentionally placed there.<ref name=":0" /> These backdoors can be used for good or bad purposes. Some may exist for testing purposes. However, if left in the final product, may be susceptible to exploitation. Other built-in backdoors are used by the company for nefarious purposes.  

Revision as of 16:11, 25 February 2026

A backdoor is a method of covertly bypassing authentication, often in a digital system. A backdoor can be placed intentionally by a party to secretly access the system, or can be the result of a bug or exploit.

How it works

There are many types of backdoor.

Backdoor malware

A backdoor malware is a software that, when executed installs a backdoor into the system that executed it.[1] This is often referred to as a Trojan. These often use an unpatched exploit to gain access to the system.

Proprietary backdoors

A propriatary backdoor is a built-in backdoor; A backdoor that was intentionally placed there.[1] These backdoors can be used for good or bad purposes. Some may exist for testing purposes. However, if left in the final product, may be susceptible to exploitation. Other built-in backdoors are used by the company for nefarious purposes.

Why it is a problem

Backdoors can be used to inject spyware in order to collect information on users.[1]

Examples

References

  1. 1.0 1.1 1.2 Malwarebytes. "Backdoor computing attakcs". Archived from the original on 29 Dec 2025.