Custom Search

Cyber Security:

Rootkit

The name "rootkit" derives from Unix and Linux operating systems, where:

The most privileged account admin is called the "root". Once a 'threat actor' has root-level (administrator-level, privileged) access, nothing on your computer is secure. They have potential control of everything.
the applications which allow unauthorized root or admin-level access to the device are known as the "kit"

 

A rootkit is a type of malware designed to give hackers access to and control over a target device. Although most rootkits affect the software and the operating system, some can also infect your computer's hardware and firmware. Rootkit is the most dangerous type of malware – and you won't even notice that you have it on your computer as they are adept at concealing their presence, but while they remain hidden, they are active. So, many people are not at all aware of the existence of this type of threat and of infecting their device. It is extremely difficult to spot and, therefore, very difficult to remove.

Once activated, the malicious rootkit program sets up a backdoor exploit, and may deliver additional malware, such as ransomware, bots, keyloggers (capturing your keystrokes and sending your confidential information without your consent) or trojans to the victim.

They may steal personal data and financial information, install malware or use your computer as part of a botnet to circulate spam and participate in DDoS (distributed denial of service) attacks.

One of the most famous and dangerous rootkits in history was Stuxnet - a malicious computer worm first uncovered in 2010, that targeted Iranian nuclear facilities. It was created by the USA and Israel and who then lost control of it.