Backdoor
A backdoor is a hidden method of bypassing normal authentication or security controls to gain unauthorized access to a system, application, or network - often to maintain covert access over time.
What is a backdoor?
In cybersecurity, a backdoor is a secret access mechanism that allows someone to enter a system without going through standard login or security checks. Backdoors can be:
- Malicious (installed by attackers to retain access after initial compromise), or
- Legitimate but risky (left by developers for debugging, support, or emergency access - sometimes called “maintenance backdoors”).
A key characteristic is stealth: backdoors are designed to be difficult to detect and may operate only under specific conditions.
Why backdoors matter
Backdoors often enable attackers to:
- Maintain persistent access even after passwords are changed
- Regain access after malware cleanup (“re-entry”)
- Move laterally to other systems and escalate privileges
- Exfiltrate sensitive data without triggering obvious alerts
- Prepare for a later stage attack such as ransomware deployment
Because they bypass normal security controls, backdoors can undermine otherwise strong defenses.
Common types of backdoors
Backdoors come in multiple forms, including:
-
Software backdoors
- Hidden admin accounts, hardcoded credentials, undocumented APIs
- Trojanized applications or libraries that include covert access paths
-
Web backdoors (web shells)
- Malicious scripts uploaded to a web server that allow remote command execution
- Often seen after exploiting vulnerabilities in CMS, plugins, or web frameworks
-
OS-level backdoors
- Rootkits, modified system binaries, hidden services, scheduled tasks
- Kernel-level implants in advanced intrusions
-
Network / device backdoors
- Malicious or insecure firmware on routers/firewalls/IoT devices
- Hidden remote management interfaces or exposed debug ports
-
Cloud / identity backdoors
- Malicious OAuth apps, rogue service principals, persistent API tokens
- Compromised IAM roles or access keys that provide ongoing access
Typical ways backdoors are installed
Attackers frequently plant backdoors after:
- Exploiting an unpatched vulnerability (RCE, web app flaws)
- Phishing that delivers an initial loader, then a persistent implant
- Credential theft followed by creation of new accounts/keys/tokens
- Supply chain compromise (tainted updates/dependencies)
Backdoors are often deployed soon after attackers gain a foothold, to ensure they can return even if the initial vector is closed.
Backdoor vs Trojan vs Rootkit
These terms overlap but are not identical:
- Backdoor: the access path that bypasses normal controls
- Trojan: malware disguised as legitimate software
- Rootkit: tools/techniques that hide malicious activity (often including backdoor functionality)
A single intrusion can use all three: a trojan delivers a backdoor, and a rootkit hides it.
Indicators of a backdoor
Common red flags include:
- Unknown scheduled tasks, startup items, services, or cron jobs
- Unexpected outbound connections (beacons) to suspicious domains/IPs
- New local/admin accounts, changes in group memberships
- Unusual OAuth consent grants, new app registrations, long-lived tokens
- Modified binaries, suspicious DLLs, unsigned drivers
How to defend against backdoors
Effective controls typically include:
- EDR with behavioral detection + blocking suspicious persistence techniques
- Strong identity controls (MFA, conditional access, least privilege, auditing)
- Routine patching and reduction of exposed services (RDP/VPN/admin panels)
- Application allowlisting and code integrity policies (when feasible)
- Centralized logging (SIEM) with alerts for persistence and anomalous auth
In incident response, it is critical to search for persistence mechanisms and identity-based backdoors (cloud/SaaS), not only endpoint malware.
Common mistakes
- Removing the obvious malware but failing to remove persistence artifacts
- Resetting user passwords while leaving service accounts/keys unchanged
- Overlooking cloud “backdoors” (OAuth apps, tokens, service principals)
- Not rotating secrets after compromise (API keys, certificates, access tokens)