B

Backdoor

A backdoor is a hidden method of bypassing normal authentication or security controls to gain unauthorized access to a system, application, or network - often to maintain covert access over time.

What is a backdoor?

In cybersecurity, a backdoor is a secret access mechanism that allows someone to enter a system without going through standard login or security checks. Backdoors can be:

  • Malicious (installed by attackers to retain access after initial compromise), or
  • Legitimate but risky (left by developers for debugging, support, or emergency access - sometimes called “maintenance backdoors”).

A key characteristic is stealth: backdoors are designed to be difficult to detect and may operate only under specific conditions.

Why backdoors matter

Backdoors often enable attackers to:

  • Maintain persistent access even after passwords are changed
  • Regain access after malware cleanup (“re-entry”)
  • Move laterally to other systems and escalate privileges
  • Exfiltrate sensitive data without triggering obvious alerts
  • Prepare for a later stage attack such as ransomware deployment

Because they bypass normal security controls, backdoors can undermine otherwise strong defenses.

Common types of backdoors

Backdoors come in multiple forms, including:

  • Software backdoors

    • Hidden admin accounts, hardcoded credentials, undocumented APIs
    • Trojanized applications or libraries that include covert access paths
  • Web backdoors (web shells)

    • Malicious scripts uploaded to a web server that allow remote command execution
    • Often seen after exploiting vulnerabilities in CMS, plugins, or web frameworks
  • OS-level backdoors

    • Rootkits, modified system binaries, hidden services, scheduled tasks
    • Kernel-level implants in advanced intrusions
  • Network / device backdoors

    • Malicious or insecure firmware on routers/firewalls/IoT devices
    • Hidden remote management interfaces or exposed debug ports
  • Cloud / identity backdoors

    • Malicious OAuth apps, rogue service principals, persistent API tokens
    • Compromised IAM roles or access keys that provide ongoing access

Typical ways backdoors are installed

Attackers frequently plant backdoors after:

  • Exploiting an unpatched vulnerability (RCE, web app flaws)
  • Phishing that delivers an initial loader, then a persistent implant
  • Credential theft followed by creation of new accounts/keys/tokens
  • Supply chain compromise (tainted updates/dependencies)

Backdoors are often deployed soon after attackers gain a foothold, to ensure they can return even if the initial vector is closed.

Backdoor vs Trojan vs Rootkit

These terms overlap but are not identical:

  • Backdoor: the access path that bypasses normal controls
  • Trojan: malware disguised as legitimate software
  • Rootkit: tools/techniques that hide malicious activity (often including backdoor functionality)

A single intrusion can use all three: a trojan delivers a backdoor, and a rootkit hides it.

Indicators of a backdoor

Common red flags include:

  • Unknown scheduled tasks, startup items, services, or cron jobs
  • Unexpected outbound connections (beacons) to suspicious domains/IPs
  • New local/admin accounts, changes in group memberships
  • Unusual OAuth consent grants, new app registrations, long-lived tokens
  • Modified binaries, suspicious DLLs, unsigned drivers

How to defend against backdoors

Effective controls typically include:

  • EDR with behavioral detection + blocking suspicious persistence techniques
  • Strong identity controls (MFA, conditional access, least privilege, auditing)
  • Routine patching and reduction of exposed services (RDP/VPN/admin panels)
  • Application allowlisting and code integrity policies (when feasible)
  • Centralized logging (SIEM) with alerts for persistence and anomalous auth

In incident response, it is critical to search for persistence mechanisms and identity-based backdoors (cloud/SaaS), not only endpoint malware.

Common mistakes

  • Removing the obvious malware but failing to remove persistence artifacts
  • Resetting user passwords while leaving service accounts/keys unchanged
  • Overlooking cloud “backdoors” (OAuth apps, tokens, service principals)
  • Not rotating secrets after compromise (API keys, certificates, access tokens)