Technology Computer & Networking security

What Is A Rootkit?

Within the pantheon of malicious software that is floating out in the internet ether, the malware known as a rootkit is recognized as being particularly vicious. Where as most malware is designed to log keystrokes, crash systems, or collect and transmit personal data, rootkits are designed to actually seize control of a computer and allow the intruder to do nearly anything and remain undetected.

Like other types of malicious software, a rootkit can find its way onto a computer through any number of ways. Most often they exploit security weaknesses in the various operating systems.

Once installed, the rootkit will bury itself deep inside of the operating system. It will replace vital system files with nearly identical files which contain special code to allow 'backdoors' or other hooks to be employed which will grant the user access to the computer.

Once that access is secured, and the rootkit is successfully working to mask itself from standard detection, the possibilities are endless. Some hackers will install software that will turn the computer into a 'zombie', executing commands or denial of service attacks against websites around the world. Others may simply install key loggers or monitors for specific hardware ports in an attempt to record personal information.

An even more malicious practice with rootkits is to install special code into different parts of the computer BIOS and boot sectors that will prevent the computer from booting at all or damage internal hardware.

For users who are novices on a computer and who do not install malicious software detection and removal programs, acquiring a rootkit can only lead to complete and total loss. Eventually, the system will cease to function and it will be necessary to re-install the operating system and possibly re-format the hard drive to remove all traces of the rootkit and restore normal functions.

Even for those who have computer experience and good virus scanning and removal software, it may be necessary to manually remove some components from the system in order to be certain that there are no traces left which could, in time, re-install the virus.

The best policy is to lower the risk of running across a rootkit altogether. This means strictly monitoring your internet security settings, avoiding suspect websites, keeping a firewall installed and maintained, and regularly running malicious software removal tools.

Leave a reply