A rootkit is a program or a collection of malicious software tools that give athreat actor remote access to and control over a computer or other system. Although this type of software has some legitimate uses, such as providing remote end-user support, most rootkits open abackdoor on victims' systems to introduce malicious software -- including computer viruses, ransomware,keylogger programs or other types ofmalware -- or to use the system for further network security attacks.
Rootkits often attempt to prevent the detection of malicious software by deactivating endpointantimalware and antivirus software. They can be purchased on the dark web and installed during phishing attacks or used as asocial engineering tactic to trick users into giving them permission to install them on their systems. This often gives remote cybercriminals administrator access to the system.
Once installed, a rootkit gives the remote actor access to and control over almost every aspect of the operating system (OS). Older antivirus programs often struggled to detect rootkits, but today, most antimalware programs can scan for and remove rootkits hiding within a system.
Since rootkits can't spread by themselves, they depend on clandestine methods to infect computers. When unsuspecting users give rootkit installer programs permission to be installed on their systems, the rootkits install and conceal themselves until hackers activate them. Rootkits contain malicious tools, including banking credential stealers, password stealers, keyloggers, antivirus disablers and bots fordistributed denial-of-service attacks.
Rootkits are installed through the same common vectors as any malicious software, including email phishing campaigns, executable malicious files, crafted malicious PDF files and Microsoft Word documents. They are also connected to compromised shared drives or downloaded software infected with the rootkit from risky websites.
A rootkit attack can have the following consequences:
A primary goal of a rootkit is to avoid detection to remain installed and accessible on the victim's system. Although rootkit developers aim to keep their malware undetectable, and there aren't many easily identifiable symptoms that flag a rootkit infection, the following are four indicators that a system has been compromised:
Rootkits are classified based on how they infect, operate or persist on the target system:
Although it's difficult to detect a rootkit attack, an organization can build its defense strategy in the following ways:
Once a rootkit compromises a system, the potential for malicious activity is high, but organizations can take steps to remediate a compromised system.
Rootkit removal can be difficult, especially for rootkits incorporated into OS kernels, firmware or storage device boot sectors. While some anti-rootkit software can detect and remove some rootkits, this type of malware can be difficult to remove entirely.
One approach to rootkit removal is to reinstall the OS, which, in many cases, eliminates the infection. Removing bootloader rootkits might require accessing the infected storage device using a clean system running a secure OS.
Rebooting a system infected with a memory rootkit removes the infection, but further work might be required to eliminate the source of the infection, which could be linked tocommand-and-control servers with a presence in the local network or on the public internet.
It's important to remind employees and users to notify IT whenever any laptop, tablet or other device is rootkit-infected.
The following illustrates several notable rootkit attacks:
Gamer attacks targeting Microsoft digital signature. In 2023, a China-based hacking team initiated a campaign that targeted gamers in that country using a rootkit with a valid Microsoft digital signature. The attack allowed it to load into game devices without being blocked and to download unsigned kernel mode drivers directly into memory. The rootkit was able to shut down Windows Defender in target systems.
Spicy Hot Pot attack. In 2020, an incident involving Zirconium, a Chineseadvanced persistent threat group that developed a set of rootkit-like functions to infiltrate and compromise targeted systems via social engineering andspear phishing. The group, associated with the Chinese government, employed its custom malware to gain unauthorized access to networks in pursuit of sensitive information.
The Sony BMG copy protection scandal. Perhaps the best-known rootkit incident happened in 2005 when it was discovered that Sony BMG had secretly deployed rootkits on over 25 million CDs that installeddigital rights management software on consumer devices to modify their OSes to interfere with CD copying. This also created vulnerabilities to other forms of malware. One program spied on users' private listening habits. The resulting public outcry triggered government investigations, class-action lawsuits and a large recall of the affected CDs.
Wiperware is a newer threat with far worse consequences than phishing and ransomware combined. Learn how toprotect your organization from this malicious cybersecurity threat.
FWA delivers wireless broadband internet to remote regions, temporary setups and other locations not suitable for wired ...
The internet would be different today without DNS anchoring digital communications. Companies can take some basic steps to ensure...
Cisco's entrée into 102.4 Tbps silicon boasts in-place programmability and new AgenticOps features as enterprise AI ...
The current AI hype era resembles the dot-com bubble era in some ways, but there are significant differences as well.
Rimini Street's CIO explains how he deployed agentic AI for research and service -- and how an AI steering committee governs ...
Agentic AI is forcing CIOs to rethink IT strategy. Success depends on identifying key use cases, assessing data readiness, ...
With Windows 10 end of support now past, enterprises must evaluate whether to upgrade to Windows 11 based on hardware readiness, ...
Risk is no longer centered only in core systems. Identity, hiring, endpoints and partner platforms are where exposure ...
The Windows 10 end-of-support deadline forces IT teams to choose between Windows 11 migration, ESU enrollment and broader desktop...
Q4 cloud infrastructure service revenues reach $119.1 billion, bringing the 2025 total to $419 billion. See how much market share...
Will $5 trillion in AI infrastructure investment be enough? Cloud providers facing that question must also yield a return, ...
As IT leaders aggressively re-allocate capital to fund new AI initiatives, repatriation offers both savings and greater control, ...
With AI agents increasingly acting as digital concierges for shoppers, verifying bot identities, securing the APIs they rely on, ...
The ICO has won an important appeal relating to data protection obligations arising from a 2017-18 cyber attack at electronics ...
A newly-uncovered malware targeting the Android operating system seems to exploit Google’s Gemini GenAI tool to help it maintain ...
