8. Back-Door Access
Use of a back door is commonly used in targeted, cyberespionage attacks, according to Verizon, which found back door use in 70 percent of cyberespionage cases it analyzed. Once a cybercriminal establishes a foothold, a back door helps them maintain remote access to an infected system. They remain stealthy while often uploading more malware or pivoting to systems containing more sensitive data. Back-door access was observed in some of the latest retail breaches. It also is used in some automated attack toolkits by financially motivated cybercriminals, according to the Verizon data. The firm referenced Nitol, a popular crimeware toolkit in Asia, which allows back-door access and causes infected systems to participate in distributed denial-of-service attacks.