{"id":52561,"date":"2023-06-28T15:54:49","date_gmt":"2023-06-28T15:54:49","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34759\/SMBs-Plagued-By-Exploits-Trojans-And-Backdoors.html"},"modified":"2023-06-28T15:54:49","modified_gmt":"2023-06-28T15:54:49","slug":"smbs-plagued-by-exploits-trojans-and-backdoors","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/","title":{"rendered":"SMBs Plagued By Exploits, Trojans, And Backdoors"},"content":{"rendered":"<p>Despite best cybersecurity efforts, small- and mid sized businesses (SMBs) continue to struggle to thwart attacks and harden defenses. Exploits, trojans and backdoors continue to plague SMBs in 2023, with no perceptible change in frequency of attacks from 2022.<\/p>\n<p>The data comes from researchers who warn that SMB business are struggling to gain an edge on their cybersecurity needs as they juggle 2023 challenges such as remote workforces,&nbsp;fighting inflation, tackling supply chain issues and investing in new revenue streams.<\/p>\n<p>The report titled Cyber-resilience During a Crisis is authored by Kaspersky and looks at the biggest threats facing SMBs within the first five months of 2023.<\/p>\n<p>&#8220;The vulnerabilities faced by SMBs are not to be underestimated,\u201d said Vasily Kolesnikov, a security expert at Kaspersky i<a href=\"https:\/\/securelist.com\/smb-threat-report-2023\/110097\/\" target=\"_blank\" rel=\"noreferrer noopener\">n a press statement announcing the report<\/a>. \u201cAs these businesses are the backbone of most countries&#8217; economies, it is crucial that governments and organizations alike step up their efforts to safeguard these enterprises. Awareness and investment in robust cybersecurity solutions must become a top priority to protect SMBs from evolving cyber threats.&#8221;<\/p>\n<h2>Key finding of the report<\/h2>\n<p>Attacks on <a href=\"https:\/\/www.scmagazine.com\/news\/ransomware\/vast-majority-of-smbs-are-concerned-about-a-ransomware-attack-on-their-business\" target=\"_blank\" rel=\"noreferrer noopener\">SMBs<\/a> have been a concern for the past couple of years as security researchers have said companies with fewer than 100 workers are vulnerable to social engineering attacks. A Kaspersky study from last year found that four in 10 SMB employers admitted that a cybersecurity incident would be a major crisis for their business, superseded only by a slump in sales or a natural disaster.<\/p>\n<p>Kaspersky conducted the most recent study by collecting data from SMB clients and the use of software applications such as Microsoft Office, <a rel=\"noreferrer noopener\" href=\"https:\/\/www.scmagazine.com\/news\/malware\/microsoft-teams-bug-sidestep-security-malware\" target=\"_blank\">Teams<\/a> and Skype. It then ran these software names againstits telemetry to find out how much malware and unwanted software was distributed by these apps.<\/p>\n<p>Between January 1 and May 18 of this year, 2,392 SMB employees in the Kaspersky network encountered malware or unwanted software disguised as business apps, with 2,478 unique files distributed in this way. The total number of detections totaled 764,015.<\/p>\n<p>The researchers found that exploits accounted for 483,980 detections \u2013 well more than half. Exploits are malicious programs designed to take advantage of vulnerabilities in software. They typically run other malware on the system, elevate an attacker\u2019s privileges, or cause the target application to crash. They often penetrate a victim\u2019s device without any action by the user.<\/p>\n<figure><img alt srcset=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2Fkaspersky-top-10-threats-of-2023.jpg&amp;w=16&amp;q=75 1x\" src=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2Fkaspersky-top-10-threats-of-2023.jpg&amp;w=16&amp;q=75\" width=\"0\" height=\"0\" decoding=\"async\" data-nimg=\"1\" class=\"MediaItem_img__WJ8V4\" loading=\"lazy\"><figcaption><em>TOP 10 threats for SMBs, January-May 2022&nbsp;<\/em>&#8211; Kaspersky<\/figcaption><\/figure>\n<p>Trojans, the second-biggest SMB threat, enter the system in disguise and then start loading malware. A Trojan can perform various destructive actions, such as deleting, blocking, modifying or copying data, or disrupting the performance of a computer or a network.<\/p>\n<p>While exploits and trojans are very common, the researchers said backdoors are among the most dangerous types of malware because once they infiltrate a victim\u2019s device, they give attackers remote control. Once attackers gain control, they can install, launch and run programs without the consent or knowledge of the user. Attackers use backdoors to send, receive, execute and delete files, and harvest confidential data from the computer.<\/p>\n<p>SMBs are often more of a target than they realize, said Mike Parkin, senior technical engineer at Vulcan Cyber. While an attacker\u2019s potential take is smaller, it\u2019s a low-risk attack and SMB organizations often have less investment in cybersecurity than larger organizations. SMBs are particularly susceptible to ransomware and business email compromise attacks, said Parkin.<\/p>\n<p>\u201cWhile zero-day exploits and other high-profile attacks get a lot of attention many, if not most, attacks still target users,\u201d said Parkin. \u201cFor SMBs, that usually means phishing emails or other social engineering attacks that lead to compromise, or business email compromise attacks that can lead to direct losses through fraud. \u201cSMBs are often resource-restricted when it comes to cybersecurity, which means they need to be efficient with the resources they do have. Focusing on user education can deliver a lot of value for the investment.\u201d<\/p>\n<p>&nbsp;Many SMB organizations have good security measures for their core IT systems, but they don\u2019t for their IoT and OT devices, said Bud Broomhead, chief executive officer at Viakoo. These devices often are used by malicious hackers to gain access to a network, and in many SMB environments, Broomhead said that network access lets attackers move laterally to breach core IT systems.&nbsp;Some remediation: an automated method of firmware, password, and certificate management on IoT\/OT devices can dramatically reduce the attack surface within an SMB.<\/p>\n<figure><img alt srcset=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2Fnumber-of-companies-nav-security-incidents-kaspersky.jpg&amp;w=16&amp;q=75 1x\" src=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2Fnumber-of-companies-nav-security-incidents-kaspersky.jpg&amp;w=16&amp;q=75\" width=\"0\" height=\"0\" decoding=\"async\" data-nimg=\"1\" class=\"MediaItem_img__WJ8V4\" loading=\"lazy\"><figcaption>Proportion of companies that had to navigate cyber security incidents in the past &#8211; Kaspersky<\/figcaption><\/figure>\n<p>\u201cThe proliferation of connected devices, especially IoT\/OT devices, has led many organizations to lose track of what they have, let alone be able to secure them,\u201d said Broomhead. \u201cWith many SMBs still having employees work from home, the blending of work and home networks has expanded the opportunities for unsecure devices to breach and exploit corporate resources.&nbsp;More SMBs are turning to outside service providers to perform a range of services, such as having a virtual CISO do security assessments and maintain cyber hygiene on IT and IoT\/OT devices.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34759\/SMBs-Plagued-By-Exploits-Trojans-And-Backdoors.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[2335],"class_list":["post-52561","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlineflawbackdoor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SMBs Plagued By Exploits, Trojans, And Backdoors 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SMBs Plagued By Exploits, Trojans, And Backdoors 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-28T15:54:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2Fkaspersky-top-10-threats-of-2023.jpg&amp;w=16&amp;q=75\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smbs-plagued-by-exploits-trojans-and-backdoors\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smbs-plagued-by-exploits-trojans-and-backdoors\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"SMBs Plagued By Exploits, Trojans, And Backdoors\",\"datePublished\":\"2023-06-28T15:54:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smbs-plagued-by-exploits-trojans-and-backdoors\\\/\"},\"wordCount\":847,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smbs-plagued-by-exploits-trojans-and-backdoors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2Fkaspersky-top-10-threats-of-2023.jpg&amp;w=16&amp;q=75\",\"keywords\":[\"headline,flaw,backdoor\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smbs-plagued-by-exploits-trojans-and-backdoors\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smbs-plagued-by-exploits-trojans-and-backdoors\\\/\",\"name\":\"SMBs Plagued By Exploits, Trojans, And Backdoors 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smbs-plagued-by-exploits-trojans-and-backdoors\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smbs-plagued-by-exploits-trojans-and-backdoors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2Fkaspersky-top-10-threats-of-2023.jpg&amp;w=16&amp;q=75\",\"datePublished\":\"2023-06-28T15:54:49+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smbs-plagued-by-exploits-trojans-and-backdoors\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smbs-plagued-by-exploits-trojans-and-backdoors\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smbs-plagued-by-exploits-trojans-and-backdoors\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2Fkaspersky-top-10-threats-of-2023.jpg&amp;w=16&amp;q=75\",\"contentUrl\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2Fkaspersky-top-10-threats-of-2023.jpg&amp;w=16&amp;q=75\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smbs-plagued-by-exploits-trojans-and-backdoors\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,flaw,backdoor\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineflawbackdoor\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SMBs Plagued By Exploits, Trojans, And Backdoors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SMBs Plagued By Exploits, Trojans, And Backdoors 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/","og_locale":"en_US","og_type":"article","og_title":"SMBs Plagued By Exploits, Trojans, And Backdoors 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-06-28T15:54:49+00:00","og_image":[{"url":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2Fkaspersky-top-10-threats-of-2023.jpg&amp;w=16&amp;q=75","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"SMBs Plagued By Exploits, Trojans, And Backdoors","datePublished":"2023-06-28T15:54:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/"},"wordCount":847,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2Fkaspersky-top-10-threats-of-2023.jpg&amp;w=16&amp;q=75","keywords":["headline,flaw,backdoor"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/","url":"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/","name":"SMBs Plagued By Exploits, Trojans, And Backdoors 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2Fkaspersky-top-10-threats-of-2023.jpg&amp;w=16&amp;q=75","datePublished":"2023-06-28T15:54:49+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/#primaryimage","url":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2Fkaspersky-top-10-threats-of-2023.jpg&amp;w=16&amp;q=75","contentUrl":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2Fkaspersky-top-10-threats-of-2023.jpg&amp;w=16&amp;q=75"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/smbs-plagued-by-exploits-trojans-and-backdoors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,flaw,backdoor","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineflawbackdoor\/"},{"@type":"ListItem","position":3,"name":"SMBs Plagued By Exploits, Trojans, And Backdoors"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52561"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52561\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}