The popular adage âwe often get in through the back door more quickly than the front doorâ has stood the test of time, even in our modern and advanced world. App backdoors have become commonplace in today’s business environment, forcing us to take the same level of precaution we would take to protect the backdoor of our homes.
In this article, we’ll explore and explain the most common backdoors that you may come across while using an app.
In 2017, security researchers discovered an advanced backdoor integrated into server management applications from South Korea-based NetSarang and the United States. Dubbed ShadowPad, the backdoor has the ability to download and install additional malware as well as fraudulent data. If the data passed to the backdoor creators were of any interest, their C&C (command and control) servers would respond by triggering the backdoor function to run additional payloads.
This attack suggested the need to remain vigilant against enterprise application backdoors where critical data of an enterprise application is compromised in order to gain open access to the software for process creation, monitoring and management. flight.
2. Rear port
Developed in 1998, the Back Orifice backdoor allowed its creators to remotely control systems running Microsoft Windows. The idea was to demonstrate the underlying security issues in Microsoft Windows 98, so it had capabilities such as the ability to hide within the application.
This has been praised by the majority of cybercriminals who have successfully used Back Orifice as a malicious payload. The payload creates a copy of itself in the Windows application’s system directory and inserts a value containing its filename in the Windows registry under the key. The backdoor even has a successor in the form of BO2K (Back Orifice 2000), which allows unauthorized access to Windows (Read More …)