Backdoors: What They Are and How to Defend Networks against Them

Backdoors, applications that open computers to remote access, are an essential part of targeted attacks. Backdoors enable threat actors to gain command-and-control and move laterally across their targeted network. Many targeted attacks reflected that various tactics are used by backdoors to carry out their routines while remaining undetected by network administrators and security software products. Additionally, these techniques have evolved overtime as IT admins started to employ more sophisticated network defenses.

Attackers use backdoors to command and control their target networks. So far, research noted that attackers commonly take advantage of these eight backdoor techniques:

http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/using-8-backdoor-techniques-attackers-steal-company-data

IT admins must beef up their network security against backdoor techniques used in targeted attacks by keeping watch for potential vulnerabilities and stay aware and updated on security, and the proper investing in solutions like:firewall, real time network monitoring, and anti-malware solutions, and should foucous on the integration part in theses solution and on the incedent response p

Mohammad Abu Allawi

EC-Council Cyber Security Instructor (CEH, CHFI, CSA, CND, ECIH, CEI) CISM, ISO 27001, Linux, Microsoft,

10y

most backdoor come from trojans using covert channels to communicate between the victim and the C&C

Like
Reply

To view or add a comment, sign in

More articles by Ayman Hammoudeh

Explore content categories