Backdoors are applications that open computers to remote access, and are used as a way to avoid detection and carry out targeted attacks. How can IT administrators secure their networks against these backdoor techniques?
Trend Micro researchers looked into the way attackers use backdoors to command and control their target networks. So far, our researchers noted that attackers commonly take advantage of these eight backdoor techniques.
A backdoor was at the tail-end of the July 2013 Gizmodo Brazil website compromise. Said backdoor was hosted in Google Drive, a legitimate Google service.