Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Malware
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
====Backdoors==== {{Main|Backdoor (computing)}} A [[backdoor (computing)|backdoor]] is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge.<ref name=":6">{{Citation|last=Gill|first=Harjeevan|title=Malware: Types, Analysis and Classifications|date=2022-06-21|url=https://engrxiv.org/preprint/view/2423|access-date=2024-06-22|language=en|doi=10.31224/2423}}</ref> The attacker typically uses another attack (such as a [[Trojan horse (computing)|trojan]], [[Computer worm|worm]] or [[Computer virus|virus]]) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a [[software bug]] in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world.<ref>{{cite news|last=Staff|first=SPIEGEL|date=2013-12-29|title=Inside TAO: Documents Reveal Top NSA Hacking Unit|newspaper=Spiegel Online|publisher=SPIEGEL|url=http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html|access-date=23 January 2014|archive-date=20 April 2017|archive-url=https://web.archive.org/web/20170420112316/http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html|url-status=live}}</ref> Backdoors may be installed by Trojan horses, [[computer worm|worms]], [[NSA ANT catalog|implants]], or other methods.<ref>{{cite web|last=Edwards|first=John|title=Top Zombie, Trojan Horse and Bot Threats|url=http://www.itsecurity.com/features/top-zombie-trojan-bots-092507|url-status=dead|archive-url=https://web.archive.org/web/20170209142725/http://www.itsecurity.com/features/top-zombie-trojan-bots-092507/|archive-date=9 February 2017|access-date=25 September 2007|publisher=IT Security}}</ref><ref>{{cite news|last=Appelbaum|first=Jacob|date=2013-12-29|title=Shopping for Spy Gear:Catalog Advertises NSA Toolbox|newspaper=Spiegel Online|publisher=SPIEGEL|url=http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html|access-date=29 December 2013|archive-date=20 April 2017|archive-url=https://web.archive.org/web/20170420112319/http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html|url-status=live}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)