Short bio

Malwarebytes uses the detection name “Backdoor.” for a category of Trojans that enable threat actors to gain remote access and control over an affected system.

Type and source of infection

The dropping or downloading of a backdoor is often the second stage in an attack, where the first stage is the infiltration of the Trojan dropper or downloader, and the final stage is gaining full control of the affected system. In many cases, a backdoor is a payload as the attacker can build out his control once it is functioning.


Malwarebytes protects users from backdoors by using real-time protection.


Malwarebytes can detect and remove backdoors without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  3. Then click Finish.
  4. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  5. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  6. When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  7. Restart your computer when prompted to do so.

Select your language