The term translates as ‘backdoor’ and refers to an alternative means of accessing software or a computer. A backdoor may be built into a programme by a legitimate software manufacturer, for example to allow access to the programme on behalf of the customer in the event of a forgotten password. As malware, a backdoor allows cybercriminals to access a computer or network. They can thereby control a computer, lock it, encrypt its data, manipulate inputs or spy on it. A backdoor program often enters the system via a Trojan horse.
By opening a malicious email attachment, you may unwittingly install a backdoor program on your computer. This may initially go unnoticed, for example if the program is designed to spy on data and password entries. Or if it sets up a backdoor for a blackmail attack that takes place at a later date.