IS USING INTERNET SAFE?

How Does A Backdoor Work?
It works in the background and is
not visible in software in use. It is very similar to other viruses and malware,
and therefore difficult to detect. A hacker can use the backdoor to spy on a
user, manage their files, install additional software or malware, monitor the
entire PC system, and attack other hosts. Often the backdoor also has other
malicious functions, such as keystroke recording, screenshot capture,
miscellaneous infections, and file encryption. This parasite is the result of a
combination of various private security threats that are interrelated and do
not require special remote control.
Typically backdoors are Trojans,
viruses, keyloggers, spyware, and specific remote management tools. They work
the same as the virus apps mentioned above. However, their functionality and
viral load are much more complex and dangerous, and therefore they fall into a
specific category.
The most common backdoor programs
mainly infect computers running the Microsoft Windows operating system.
However, many little-known backdoors are designed to work in different environments,
such as Mac OS X.
How Are Back Doors Spreading?
Physical access to the computer
The easiest way is to physically
access the machine (yourself, an employee, someone who can access your
premises, a private investigator, a relative etc. The person who had access to
the computer can also be a normal user who has been manipulated and unintentionally
installs the parasite, causing him to do something completely different with
the installation of this software, through an usb stick or the like. This
should be considered a security breach (the first and the biggest security
breach often turns out to be a human).
Social engineering
A convincing text or a deceptive
demonstration convinced you to install a simple toolbar that you think you
need. Many unauthorized security services, many of which carry parasites
(behaving like Trojans), use this social engineering technique. Here again, the
problem is human.
With the help of a Trojan horse
The most common way to install a
parasite is to use a Trojan horse or Trojan. For example, you install software
X on your computer: it does not install itself. But X is a vector for many
parasites, including a virus that allows you to install other parasites in your
system. It is a Trojan horse. This need to install the Trojan to install the
parasites it contains is important because it indicates that it is installed in
an authorized way. As a result, security measures and procedures are deficient
and ineffective, or the attacker has an accomplice.
Opening a trapped email
Spam or not, you should never
open an email whose sender you do not know and you should never click on the
link it contains (if it contains one). Such an e-mail can be likened to a
Trojan horse, which the e-mail service providers have not detected as
malicious.
Hoax usage
They are generally found in P2P
networks, where the parasites are named for highly sought-after programs
(recently released games, the most downloaded films, etc.) but also in e-mails
(spam or not), in particular to propagate a fake news with one or more links
inside! The phishing also works like this.
The use of a security vulnerability
In rare cases, the parasite gets
installed automatically from the Internet, using software vulnerabilities. For
example, one method is to attack a well-protected system, using a sniffer
(network analyzer) on the connection between that computer and a less secure
remote computer than the former regularly uses (for example, daily transfers
from a branch to mother Society). The sniffer can be used to find out the
identity and type of files sent regularly between one and the other. It is
therefore sufficient to transfer a parasite through one of these files to a
less monitored machine to infect the target machine.
Use of phishing
Today, phishing is no longer
simply copying a well-known site to retrieve your banking information. Indeed,
on certain illegal sites such as streaming or download sites, a request for
access to the location or to flash for example can be made and perfectly
imitate that of Google Chrome. If you click on it, a software installs in the
background and you are infected ... Finally, one of the oldest methods of
phishing but which still works is the use of trapped images like the famous
images invisible (especially on older browser versions).
Comments
Post a Comment