ITT Technical Institute
08/17/15
A rootkit is a type of malicious software that has the ability to compromise a computer without the user or operating system knowing it. Rootkits allows malware and viruses to hide out in the open by disguising as files that are necessary that your antivirus program will overlook. A rootkit itself is not dangerous; it is when they are then used to hide malware, viruses, bots, and worms. How rootkits got their name is from the Unix term for the primary administrator account called root, and kit refers to the software pieces that apply the tool. (tools)
For a rootkit to be installed a hacker must gain access to the “root” account by exploiting or obtaining the password by cracking its social engineering. Rootkits were used originally to target UNIX operating systems in the early 90’s. Today, rootkits can be use on other operating systems including windows and mac. Since rootkits are activated even before your operating system boots up, they are very difficult to detect. Therefore, they allow powerful access to the system without the owner knowing it. The way rootkits are installed they’re extremely hard to get rid of. Today rootkits mostly are used to mask malware payloads more effectively. (tools)
Rootkits can contain spyware and other programs that monitor traffic, and keystrokes that can create back doors into the system to attack other machines on the network as well as alter existing systems to escape detection. Late October of 2005, Mark Russinovich security expert of Sysinternals uncovered, that he had a rootkit on his own computer that was installed as a part of the DRM component of a Sony audio CD. Experts were concerned that the practice was more widespread than the public thought. They also worried that attackers could exploit existing rootkits, which can create opportunities for virus writers. Mikko Hypponen, director of AV research for Finnish Firm F-Secure Corp states that "These
Cited: Kassner, M. (n.d.). TechRepublic. Retrieved from 10+ things you should know about rootkits: http://www.techrepublic.com/blog/10-things/10-plus-things-you-should-know-about-rootkits/ Leyden, J. (n.d.). Virtual rootkits create stealth risk. Retrieved from The Register: http://www.theregister.co.uk/2006/03/13/virtual_rootkit/ Rouse, M. (n.d.). Rootkit. Retrieved from Techtarget: http://searchmidmarketsecurity.techtarget.com/definition/rootkit Rouse, M. (n.d.). Rootkit Definition . Retrieved from Tech Target: http://searchmidmarketsecurity.techtarget.com/definition/rootkit tools, P. (n.d.). What is a Rootkit Virus? Retrieved from PC Tools: http://www.pctools.com/security-news/what-is-a-rootkit-virus/