A backdoor (also known as a trap door or wormhole) in a computer system is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext while attempting to remain undetected. This backdoor may take the form of an installed program (e.g. Back Orifice) or could be a modification to an existing program or hardware device.
A backdoor in a login system might take the form of a hard coded user and password combination which gives access to the system. It should be stated, however, that the motivation for such holes in the security of a system is not always sinister; some operating systems, for example, come out of the box with privileged accounts intended for use by field service technicians or the vendor’s maintenance programmers.
How Can You Detect Backdoors? Check for Backdoors with SpyHunter!
SpyHunter is a powerful malware remediation and protection tool designed to help provide users with in-depth system security analysis, detection and removal of a wide range of threats like Backdoors as well as a one-on-one tech support service.
Free SpyHunter Remover Details & Terms
There are currently 821 articles listed on backdoors.
|Name||Threat Level||Detection Count||Date|
|Kazuar||April 21, 2020|
|Ketrican||July 19, 2019|
|Ketrum Backdoor||May 27, 2020|
|KeyStart||8/10||0||January 25, 2011|
|Killua Backdoor||November 12, 2020|
|KingOfHearts||October 16, 2020|
|KIVARS||October 22, 2020|
|LATENTBOT||8/10||23||December 16, 2015|
|Leouncia||December 15, 2010|
|LightNeuron||May 7, 2019|
|Litmus||9/10||0||November 30, 2008|
|Mac Backdoor Empr.Bowts||February 3, 2021|
|Mal/Inject-H||8/10||4||December 7, 2011|
|Mal/Inject-K||October 7, 2010|
|Mal/TibsPak||April 22, 2011|
|Mal/VB-AD||8/10||18||December 7, 2011|
|Mal/VB-JY||February 17, 2011|
|Malware.Slackor||March 17, 2011|
|Mikroceen||May 15, 2020|
|MILKDROP||October 18, 2019|
|Mivast||6/10||1||February 26, 2015|
|Molerats||March 23, 2020|
|Mousey||June 28, 2008|
|NDiskMonitor||May 13, 2020|
|OceanLotus||April 9, 2019|