rootkit


Also found in: Dictionary, Thesaurus, Medical, Legal, Wikipedia.

rootkit

A type of Trojan that keeps itself, other files, registry keys and network connections hidden from detection. It enables an attacker to have "root" access to the computer, which means it runs at the lowest level of the machine. A rootkit typically intercepts common API calls. For example, it can intercept requests to a file manager such as Explorer and cause it to keep certain files hidden from display, even reporting false file counts and sizes to the user. Rootkits came from the Unix world and started out as a set of altered utilities such as the ls command, which is used to list file names in the directory (folder).

Legitimate Rootkits?
Rootkits can also be used for what some vendors consider valid purposes. For example, if digital rights management (DRM) software is installed and kept hidden, it can control the use of licensed, copyrighted material and also prevent the user from removing the hidden enforcement program. However, such usage is no more welcomed than a rootkit that does damage or allows spyware to thrive without detection. See Trojan.
Mentioned in ?
References in periodicals archive ?
In recent years, researchers change the rootkit defense landscape by leveraging recent advances of virtualization, and propose virtual machine introspection technology to build IDSes [10] [12] [13].
If the two lists are not identical, this indicates that a rootkit is active in the system and the security solution can perform actions to neutralize suspicious objects.
Recent researches are showing that seven of the top ten threats in 2012 were rootkits and that the number of boot-level rootkits increased dramatically,” said Avishai Ziv, vice president of Cyber Security Solutions at LynuxWorks.
Rootkit for simulation process (we use FU--open source rootkit with well known code and behavior (www.
With the right rootkit, it would even be possible to redirect a person's outgoing calls to another device without them even knowing.
A rootkit can be a tool or a weapon depending on how it is employed.
Rootkit Detective offers the most comprehensive rootkit detection capabilities available today," said Ahmed Sallam, lead research architect at McAfee(R).
Rootkits are malware designed to hide themselves in another application or operating system.
com) installed rootkit code on their CDs that would install itself whenever the CD was played on a computer running Windows.
A few quick Google searches later, and Mark had found the source of the rootkit.
Dan Kaminsky, an independent Internet security researcher, traced the presence of the rootkit to more than 500,000 computer networks--including networks run by the Department of Defense--a figure likely dwarfed by the actual number of infected computers.
The suits against Sony BMG claim that its DRM solution is a rootkit, a tactic best known for its use in spyware and Trojan horses.