These are created and installed by threat actors with harmful intent. This is the more common and dangerous scenario.

  • After an initial breach: Once a hacker gets in using a spear-phishing email or an exploit, they often install a backdoor to ensure they can return later, even if the original exploit is patched.

  • Malware payload: Many types of malware, like Trojans (hence the name, Trojan Horse), carry a backdoor component designed to open a command-and-control channel back to the attacker. This allows them to remotely control the infected system.