In cybersecurity, a backdoor is a hidden method of bypassing normal authentication or security controls to gain access to a computer system or network. It can be installed by attackers during a breach or even embedded by developers for maintenance (though that’s risky). Backdoors are often used to maintain persistent access, deploy further malware, or steal data without detection.
Notable examples include:
- DoublePulsar – Used in major attacks like WannaCry after being leaked from the NSA.
- SUNBURST – A backdoor used in the SolarWinds supply chain attack, which compromised multiple U.S. government agencies.
- RCSAndroid – A mobile spyware/backdoor tied to surveillance software used by government agencies.
- FinFisher (FinSpy) – A commercial backdoor used for spying, often sold to law enforcement and intelligence agencies.
- ShadowPad – A modular backdoor linked to Chinese threat groups, found hidden in legitimate software updates.
Protect yourself from backdoors
Backdoors can stay hidden for months. Add a protective layer with trusted
antivirus + real-time security tools.
