Home > Threat descriptions >

Backdoor

Classification

Category: Malware

Type: Backdoor

Aliases: Backdoor

Summary


A remote administration utility (RAT) that allows a user to access and control a computer, usually remotely over a network or the Internet.

Removal


Automatic action

Once detected, the F-Secure security product will automatically handle a harmful program or file by either deleting or renaming it.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details


Backdoor programs may be legitimate, and may be used for legitimate reasons by authorized administrators, but they are also frequently used by attackers to gain control of a user's machine without their knowledge or authorization.

Installation

A typical backdoor consists of 2 components - the server program, which can be installed on multiple computers, and the client program that can be used to control one or all the servers.

Attackers can distribute copies of the server program to potential victims in numerous ways - for example, as part of the payload for a worm or trojan; as a disguised file attached to a spam email; as a file shared on peer-to-peer (P2P) networks, and so on.

Attackers typically rely on either social engineering or exploiting a vulnerability to install the backdoor on a computer. Once the server program is installed, it will open a network port and communicate with the client program. An attacker can then use the client to issue commands to the machine.

Impact

A backdoor is usually able to gain control of a system because it exploits undocumented processes or features in an operating system or installed program. Depending on how sophisticated a backdoor program is, it can perform actions such as:

  • Sending and receiving files
  • Getting system information
  • Changing the system settings
  • Taking screenshots
  • Playing tricks like opening and closing the DVD drive

and so on.