Backdoor: Difference between revisions
No edit summary |
Added archive URLs for 1 citation(s) using CRWCitationBot |
||
| Line 13: | Line 13: | ||
==Why it is a problem== | ==Why it is a problem== | ||
Backdoors can be used to inject [[spyware]] in order to collect information on users.<ref name=":0">{{Cite web |last=Malwarebytes |title=Backdoor computing attakcs |url=https://www.malwarebytes.com/backdoor}}</ref> | Backdoors can be used to inject [[spyware]] in order to collect information on users.<ref name=":0">{{Cite web |last=Malwarebytes |title=Backdoor computing attakcs |url=https://www.malwarebytes.com/backdoor |url-status=live |archive-url=http://web.archive.org/web/20251229225937/https://www.malwarebytes.com/backdoor |archive-date=29 Dec 2025}}</ref> | ||
==Examples== | ==Examples== | ||
Revision as of 01:38, 16 February 2026
A backdoor is a method of covertly bypassing authentication, often in a digital system. A backdoor can be placed intentionally by a party to secretly access the system, or can be the result of a bug or exploit.
How it works
There are many types of backdoor.
Backdoor malware
A backdoor malware is a software that, when executed installs a backdoor into the system that executed it.[1] This is often referred to as a Trojan. These often use an unpatched exploit to gain access to the system.
Propriatary backdoors
A propriatary backdoor is a built-in backdoor; A backdoor that was intentionally placed there.[1] These backdoors can be used for good or bad purposes. Some may exist for testing purposes. However, if left in the final product, may be susceptible to exploitation. Other built-in backdoors are used by the company for nefarious purposes.
Why it is a problem
Backdoors can be used to inject spyware in order to collect information on users.[1]
Examples
References
- ↑ 1.0 1.1 1.2 Malwarebytes. "Backdoor computing attakcs". Archived from the original on 29 Dec 2025.