01642 06 11 11 Arrange Call

Rootkit

Glossary / R

Rootkit Definition:

A Rootkit is a type of malicious software designed to provide unauthorised access and control over a computer system while remaining hidden from detection. Rootkits typically operate at the kernel level, giving attackers privileged access and enabling them to execute malicious activities without being noticed by the system’s security measures.

What is Rootkit?

Rootkits modify system files, processes, and configurations to maintain persistence and conceal their presence. Once installed, a Rootkit can enable an attacker to monitor user activity, steal data, execute arbitrary code, or manipulate system settings, often without the user's knowledge. Rootkits may be installed by Exploiting vulnerabilities, using Social Engineering techniques, or piggybacking on legitimate software.

Why is Rootkit important?

The purpose of a Rootkit is to maintain covert control over a compromised system. By hiding their presence, attackers can persist on the system for extended periods, conducting espionage, stealing sensitive data, or using the compromised system for further attacks, such as creating a Botnet or launching additional Malware.

How does Rootkit work?

Rootkits are often delivered through Phishing attacks, drive-by downloads, or by Exploiting known vulnerabilities. Once installed, they alter critical system components, such as kernel modules or drivers, to evade detection. Detecting and removing Rootkits can be challenging due to their ability to manipulate the operating system’s behaviour and hide their files and processes.

Rootkit Examples:

Examples of Rootkits include the Sony BMG Rootkit scandal, where software installed on CDs created a hidden directory to prevent music copying, and the ZeroAccess Rootkit, which was used to create Botnets and engage in click fraud. Advanced Rootkits like Stuxnet have also targeted industrial systems for covert monitoring and manipulation.

Rootkit Issues:

Rootkits pose significant security risks due to their stealth and persistence capabilities. Detecting Rootkits often requires specialised tools, such as Rootkit scanners or bootable media for offline scans. Regular software updates, endpoint protection, and cautious user behaviour are crucial to defending against Rootkit infections.

Our Services