SlideShare a Scribd company logo
BACKDOORS
SHAH JAS -95
ABOUT BACKDOORS
• IN CYBERSECURITY, A BACKDOOR IS
ANYTHING THAT CAN ALLOW AN
OUTSIDE USER INTO YOUR DEVICE
WITHOUT YOUR KNOWLEDGE OR
PERMISSION.
• A BACKDOOR IS A MEANS TO ACCESS
A COMPUTER SYSTEM OR ENCRYPTED
DATA THAT BYPASSES THE SYSTEM'S
CUSTOMARY SECURITY MECHANISMS.
CAUSE OF BACKDOORS
• A DEVELOPER MAY CREATE A BACKDOOR SO THAT AN APPLICATION OR
OPERATING SYSTEM CAN BE ACCESSED FOR TROUBLESHOOTING OR OTHER
PURPOSES. HOWEVER, ATTACKERS OFTEN USE BACKDOORS THAT THEY
DETECT OR INSTALL THEMSELVES AS PART OF AN EXPLOIT. IN SOME CASES,
A WORM OR VIRUS IS DESIGNED TO TAKE ADVANTAGE OF A BACKDOOR
CREATED BY AN EARLIER ATTACK.
DETECTION
• BACKDOORS CAN BE VERY DIFFICULT TO DETECT, AND DETECTION METHODS
VARY CONSIDERABLY DEPENDING ON THE COMPUTER'S OPERATING SYSTEM.
IN SOME CASES, ANTIMALWARE SOFTWARE MAY BE CAPABLE OF DETECTING
BACKDOOR SOFTWARE. IN OTHER CASES, SECURITY PROFESSIONALS MAY
NEED TO USE SPECIALIZED TOOLS TO DETECT BACKDOORS, OR USE
A PROTOCOL MONITORING TOOL TO INSPECT NETWORK PACKETS.
PREVENTION
• THERE ARE SEVERAL DIFFERENT STRATEGIES FOR AVOIDING BACKDOOR
ATTACKS. FIRST AND FOREMOST, ORGANIZATIONS NEED TO ADHERE TO
SECURITY BEST PRACTICES, SUCH AS AVOIDING UNTRUSTED SOFTWARE AND
ENSURING THAT EVERY DEVICE IS PROTECTED BY A FIREWALL. APPLICATION
FIREWALLS CAN ALSO HELP TO PREVENT BACKDOOR ATTACKS, SINCE THEY
RESTRICT THE TRAFFIC THAT CAN FLOW ACROSS OPEN PORTS. IT IS ALSO
IMPORTANT TO MONITOR NETWORK TRAFFIC FOR SIGNATURES THAT MAY
INDICATE THE PRESENCE OF A BACKDOOR.
FAMOUS BACKDOOR ATTACKS
• IN LATE 2020, A CYBERSECURITY COMPANY CALLED FIREEYE DISCOVERED
AN EXTREMELY SERIOUS BACKDOOR HIDDEN IN UPDATES FOR SOLARWINDS’
ORION NETWORK MANAGEMENT SOFTWARE. THE ATTACKERS, WHO ARE BELIEVED
TO ORIGINATE AT THE NATION-STATE LEVEL, USED SOLARWINDS TO FACILITATE AN
ISLAND HOPPING ATTACK THAT INSTALLED MALWARE ON ORION CUSTOMER
NETWORKS IN ORDER TO GATHER INTELLIGENCE. THE UNITED STATES
CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY (CISA) BELIEVES THE
ATTACK BEGAN AS EARLY AS MARCH 2020 AND THAT NOT ALL COMPROMISED
ORGANIZATIONS WERE ACTUALLY TARGETED BY THE ATTACKER FOR FOLLOW-UP
ACTIONS.

More Related Content

Featured

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
Project for Public Spaces & National Center for Biking and Walking
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
DevGAMM Conference
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Backdoors.pptx

  • 2. ABOUT BACKDOORS • IN CYBERSECURITY, A BACKDOOR IS ANYTHING THAT CAN ALLOW AN OUTSIDE USER INTO YOUR DEVICE WITHOUT YOUR KNOWLEDGE OR PERMISSION. • A BACKDOOR IS A MEANS TO ACCESS A COMPUTER SYSTEM OR ENCRYPTED DATA THAT BYPASSES THE SYSTEM'S CUSTOMARY SECURITY MECHANISMS.
  • 3. CAUSE OF BACKDOORS • A DEVELOPER MAY CREATE A BACKDOOR SO THAT AN APPLICATION OR OPERATING SYSTEM CAN BE ACCESSED FOR TROUBLESHOOTING OR OTHER PURPOSES. HOWEVER, ATTACKERS OFTEN USE BACKDOORS THAT THEY DETECT OR INSTALL THEMSELVES AS PART OF AN EXPLOIT. IN SOME CASES, A WORM OR VIRUS IS DESIGNED TO TAKE ADVANTAGE OF A BACKDOOR CREATED BY AN EARLIER ATTACK.
  • 4. DETECTION • BACKDOORS CAN BE VERY DIFFICULT TO DETECT, AND DETECTION METHODS VARY CONSIDERABLY DEPENDING ON THE COMPUTER'S OPERATING SYSTEM. IN SOME CASES, ANTIMALWARE SOFTWARE MAY BE CAPABLE OF DETECTING BACKDOOR SOFTWARE. IN OTHER CASES, SECURITY PROFESSIONALS MAY NEED TO USE SPECIALIZED TOOLS TO DETECT BACKDOORS, OR USE A PROTOCOL MONITORING TOOL TO INSPECT NETWORK PACKETS.
  • 5. PREVENTION • THERE ARE SEVERAL DIFFERENT STRATEGIES FOR AVOIDING BACKDOOR ATTACKS. FIRST AND FOREMOST, ORGANIZATIONS NEED TO ADHERE TO SECURITY BEST PRACTICES, SUCH AS AVOIDING UNTRUSTED SOFTWARE AND ENSURING THAT EVERY DEVICE IS PROTECTED BY A FIREWALL. APPLICATION FIREWALLS CAN ALSO HELP TO PREVENT BACKDOOR ATTACKS, SINCE THEY RESTRICT THE TRAFFIC THAT CAN FLOW ACROSS OPEN PORTS. IT IS ALSO IMPORTANT TO MONITOR NETWORK TRAFFIC FOR SIGNATURES THAT MAY INDICATE THE PRESENCE OF A BACKDOOR.
  • 6. FAMOUS BACKDOOR ATTACKS • IN LATE 2020, A CYBERSECURITY COMPANY CALLED FIREEYE DISCOVERED AN EXTREMELY SERIOUS BACKDOOR HIDDEN IN UPDATES FOR SOLARWINDS’ ORION NETWORK MANAGEMENT SOFTWARE. THE ATTACKERS, WHO ARE BELIEVED TO ORIGINATE AT THE NATION-STATE LEVEL, USED SOLARWINDS TO FACILITATE AN ISLAND HOPPING ATTACK THAT INSTALLED MALWARE ON ORION CUSTOMER NETWORKS IN ORDER TO GATHER INTELLIGENCE. THE UNITED STATES CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY (CISA) BELIEVES THE ATTACK BEGAN AS EARLY AS MARCH 2020 AND THAT NOT ALL COMPROMISED ORGANIZATIONS WERE ACTUALLY TARGETED BY THE ATTACKER FOR FOLLOW-UP ACTIONS.