The Wordfence Threat Intelligence team explains why including a backdoor in your code isn’t worth it.
Wordfence-Logo.png (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVqhk81YzNg3Vc2BPZ7fW-x6W4-ljtc4XW5TYN3X6VGh3kWDcV1-WJV7CgPL8W3Rjp9q8m62drW50NSGp8NYzHQW5NR8FX56nzGrW6q8bdR4H4Xr8W806ccx4NtBg4W15Q8P450C20QW7-4B1P5Fvgh3W587bRj4YNH6XN2B6dFdxztBQW403HQF8P61YtW1mQkFg6S4gh0W8GTcGG2JYYbHW121MWV4VHG0zW3jfNPT6CwY2NW1pKndB890w0dN1yVqH981D0x3qdz1 )
Backdoor PSA Featured Image (1) (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVqhk81YzNg3Vc2BPZ7fW-x6W4-ljtc4XW5TYN3X6VJ33kWF_V1-WJV7CgGklW8rZR7d6trK-mW1rcTDM2D1p28W465_876F8hZMW4kwcV48z6rZSW2HTm6k3T4ZsDW6xSgQh3H0c4RN81fM7gtRQN0W15P4rq5Mn9TMN702pkpKqzfSW61w2p98c2kVVW4PYHwK2QGcT6W4HFYNQ39VmFnW5VBK2q2ggLlXW39gb2H3Bxqw4W8ZyqVV5R5NShW3vfStv1CmKJwW3q0cb51v2SNRW16vC_P5sBz_YW1hFChR75b0ByW9lZSHX6S0w6dW5RVMpL4yhr-PW7cD9pP6kBW9dVw5TRw7CZwq7W2zw7TQ95SDM7VyYJXG1V0XPLW19r60n23XqRkW3kZgSb90MV6NN3R6BwPtdS7B37bT1 )
In the cybersecurity field, we talk a lot about threat actors and vulnerable code, but what doesn’t get discussed enough is intentional vulnerabilities and becoming your own threat actor. Even when making decisions with the best of intentions, it is possible to work against your own best interests. One area we see this in comes from website developers trying to safeguard their work. It can be tempting to incorporate code that gives the developer access to the site files, also known as a backdoor, in the event that the client chooses not to pay, so that the developer can remove their code or otherwise damage the site.
This email content has also been published on our blog (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVqhk81YzNg3Vc2BPZ7fW-x6W4-ljtc4XW5TYN3X6VJ33kWF_V1-WJV7CgGklW8rZR7d6trK-mW1rcTDM2D1p28W465_876F8hZMW4kwcV48z6rZSW2HTm6k3T4ZsDW6xSgQh3H0c4RN81fM7gtRQN0W15P4rq5Mn9TMN702pkpKqzfSW61w2p98c2kVVW4PYHwK2QGcT6W4HFYNQ39VmFnW5VBK2q2ggLlXW39gb2H3Bxqw4W8ZyqVV5R5NShW3vfStv1CmKJwW3q0cb51v2SNRW16vC_P5sBz_YW1hFChR75b0ByW9lZSHX6S0w6dW5RVMpL4yhr-PW7cD9pP6kBW9dVw5TRw7CZwq7W2zw7TQ95SDM7VyYJXG1V0XPLW19r60n23XqRkW3kZgSb90MV6NN3R6BwPtdS7B37bT1 ) and you're welcome to post a comment there if you'd like to join the conversation. Or you can read the full post in this email.
While implementing a backdoor may seem like a viable solution to protect your resource investment, it comes with potential ethical and legal problems, in addition to the added security risks of a backdoor hardcoded into the website. There are always better options available, even if they are less convenient for the client and developer. When developing a website, the developer needs to keep in mind that their needs are just as important as the client’s needs. Keeping this in mind will help to prevent the situations that may lead to the implementation of a backdoor on the website.
One of the biggest reasons a web developer may be tempted to include a hardcoded backdoor is to ensure their work is not used without payment. A common practice among website developers is to require 50% of the development fee up front, with the remaining sum paid upon delivery of the completed project. Especially among freelance developers, it is not uncommon to begin development even before the initial fees are paid, and even provide the final code before the final payment is received. The fear of a client not making a payment may cause a developer to believe that it is a good idea to hard code a backdoor into the project, so that the developer can remove their code or take down the site entirely as a form of retaliation.
What should be obvious is that intentionally damaging a website is a violation of laws in many countries, and could lead to fines or even jail time. In the United States, the Computer Fraud and Abuse Act of 1986 (CFAA) clearly defines illegal use of computer systems. According to 18 U.S.C. § 1030 (e)(8), simply accessing computer systems in a way that uses higher privileges or access levels than permitted is a violation of the law. Further, intentionally damaging the system or data is also a crime. The penalty for violating the CFAA can include sentences up to life in prison, in addition to large financial penalties.
Let's say a developer uses a backdoor on a website they worked on simply to access the files in an unapproved manner. Even if they do not cause any damage to the system or files, the developer could face fines of $5,000 and up to five years in prison. Use of the backdoor to take the site down or otherwise damage the files or system, might lead to even more jail time and even larger fines. It could be argued that these penalties are excessive, but it’s also important to remember that they are intended as deterrents since most threat actors are never caught.
As it stands, however, freelance developers trying to protect their work are much more likely to be caught and prosecuted than scammers in countries without an extradition arrangement. An unscrupulous client who is familiar with the law could also use the threat of prosecution to extort further unpaid labor from a freelance developer who backdoored their site.
Even beyond potential legal ramifications, these practices can lead to negative word-of-mouth, which can damage the reputation of the developer. Even if the developer is able to avoid legal issues from these actions, being perceived as unethical can negatively impact future profits, and even cause a business to fail.
Another consideration is the fact that a backdoor adds a potential vulnerability to the client’s website. If the developer is able to access the site through illegitimate means, then a potential attacker may be able to use the same method to access the site’s files. Security should always be a consideration when developing a website or one of its features. Implementing insecure code can lead to similar consequences as intentionally damaging a website.
Rather than adding a backdoor into a client’s website, it is better to set clear expectations with a client regarding deliverables, and how they will be impacted by late or missing payments. It is crucial to use written contracts to specify these expectations. If possible, start with a standard written contract that all clients are required to sign and have an attorney review it for potential issues.
If there is an agreement in place that outlines the fact that no code will be provided without full payment, then the developer is under no obligation to implement the code on the production server until they have been fully paid. A development server under the developer's control should always be used, and once agreements have been met, the code can be moved from the development server to the client’s production server.
Note: This is not intended as legal advice and we recommend familiarizing yourself with all applicable laws and consulting with a licensed legal professional in your area.
The Full Product Lineup:
wf-stacked-free-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVqhk81YzNg3Vc2BPZ7fW-x6W4-ljtc4XW5TYN3X6VGV3kWDQV1-WJV7CgXgTVSzjLd67Z0m-W4gv11J8N9MRNW1qL_Mw3kXfSNW7HN2nG1pT7l2W7nlVP88WT0vVV-G9t-70y6t0W4J0K4h4Jp7MGN6-xKzmrjNyvW5dZ2Bp6B3-vqW6Lk_YY8VvtrsN1fH6Tr7xVt0W3KQF911k8BxNW245BG66mHDrVW471ypL16r__0Vqb3-36Dl2DlVGP9cP6lcrJMW61bG-Q8zvCNYW1SyCLb522FV-W1WF8-v7kRhy3W7jX4dD7GLWXj3mPr1 )
wf-stacked-premium-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVqhk81YzNg3Vc2BPZ7fW-x6W4-ljtc4XW5TYN3X6VGV3kWDQV1-WJV7CgNQvW16KBd9869CGWW1zR6st7kccpkW8QQxPs7MJbk7W3VL5Fk7PDVVVW8Z3F9_4YLYRJW3pWs5z4tg6XjW4BlZ365dMGT0W3q3PTY2j3XpXW7wN3wk1cLYgXW4zy_Jp5M-6R-W3KMNvS7CRZ91W9gzz5H7M3yD4W128zHj1Sbpl0W2bVTRV2Zg8yGW6XsW9g60tWNCW8W5fQt95Jqh_W2tnk-p8t-HDkW7WjK326-XBPgW1d8fW015yn0ZW4gQlCx167D7w3hmW1 )
wf-stacked-care-3 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVqhk81YzNg3Vc2BPZ7fW-x6W4-ljtc4XW5TYN3X6VGV3kWDQV1-WJV7CgDMPW3hLm5d3zFPZGW45w8b13jj7_cW5Zw0W227v_J9W5_WZ9q7XWYtlW5sKvYv2QMrmcW6lV8Yg140SM7VRSgqy6ZptmWW2LlJKT2H20Q-W733kJ87Gk_lCW9kR0z86m49wwW1bvxr92sHNR-W2k9cg35lnkt6W9cy21B2hRt1wVXfjkg6B9hh9N2BQG-MDyYJtW67FvhK3M5ZCQW617t5291xxQ-VJncsG60x9_7W6tQG5L2Ns2pQW6NRlzt8McYf33dKs1 )
wf-stacked-response-2 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVqhk81YzNg3Vc2BPZ7fW-x6W4-ljtc4XW5TYN3X6VGV3kWDQV1-WJV7CgZ16W7x9CkJ2M862YW1_Gzj23tr7G_N2lzVMwlZPslVBmQ7B6wWdSwW8J-tzV2-CxtjW7J8m5S6b1X17W4-_0tg21KzkdW8GLFX436cJ2JW35LtZn1k5j7XN4C2F5J-rv45W1_jdp94MGtdQW3-nNWF41cSqPN9gsZ8n9_BScN1ZFFBKYglnQW6q0dY66b583NW5ywnVw4_jxQ4W6xKmfP1W72b1W6K-HZN4Jqm4bW7RNSmJ6xbxJLW14XC35644zTb3nd01 )
wf-logo-intelligence-h-800 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVqhk81YzNg3Vc2BPZ7fW-x6W4-ljtc4XW5TYN3X6VGB3kWDwV1-WJV7CgCw6W38JrM_8ryjGzN3LKhsBdQ6tNW6M7jDh1FMyM_W5fVbYC2nN8BDF5fl983fQ6yW3qcMhL4VhP9dVsSk3Z9h98y4W81WB6b58vWNTW7n6XPp2mv1j6N99kFMF47kDwN2QNWxNVlqq9W6883vj9jb8gqW4QtHd55pcqNTV307LG3ZM890W8HqFDk3P2X5LW6YtMWC3jY4BtW4GSxjD7BtpDtW5z7HDd3-2lt93fFp1 )
logo-defiant (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVqhk81YzNg3Vc2BPZ7fW-x6W4-ljtc4XW5TYN3X6VGh3kWDcV1-WJV7CgDBBW2HLrBT5Rk3B-W3hLYs24tvfYsW4zWtWg7JKSS1W3LpFH56ppTCwW97Pzfw4ywG5-W7vlkXF4ldHvmW92-vcf3VxmBkVvmMkh54JLRmW8xQGwT1tPnBVW6809mh14r44lW3lcBRP7H3LvMW16VD1l62hsSgW6rrQrF3Vv-4cW4gk-Pb2M_xVNW5rFJz72KPZbfW7Qx5WP7vtFBg32tg1 )
Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States
Unsubscribe (
https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcMxW85WSMq94kWH9V25qRz63wmXdW5Qlvqd8Dk20FN8F0Z9L1yf0NW3127HW4QmSscW8QDs-c8Y6xRVmLsMbm2s3&v=3&_hsenc=p2ANqtz--pcmkEjWQiiexv2PQDtYKUSLcIKAWBdRpcBgrmByE0N5_49vrW_qc_kvOHF8s3usNpB37QvMkzq4CtX1eEjMTJBz0fUg&_hsmi=249354851 )
Manage preferences (
https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcMxW85WSMq94kWH9V25qRz63wmXdW5Qlvqd8Dk20FN8F0Z9L1yf0NW3127HW4QmSscW8QDs-c8Y6xRVmLsMbm2s3&v=3&_hsenc=p2ANqtz--pcmkEjWQiiexv2PQDtYKUSLcIKAWBdRpcBgrmByE0N5_49vrW_qc_kvOHF8s3usNpB37QvMkzq4CtX1eEjMTJBz0fUg&_hsmi=249354851 )
You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Wed Mar 08 2023 - 19:12:51 CET