A rootkit is a software system that consists of a program or combination of several programs designed to hide or obscure the fact that a computer system has been compromised. Contrary to what its name implies a rootkit does not grant you administrator access as it requires prior access to execute and tamper with security files and processes.

A hacker may attempt to use a rootkit to replace vital system executables which may then be used to hide processes and files the hacker has installed along with the presence of the rootkit. A rootkit is intended to seize control of the operating system. Typically rootkits act to obscure their presence on the system through subversion or evasion of standard operating system security mechanisms.

Often they are Trojans as well thus fooling users into believing they are safe to run on their systems. Rootkits may also install a “backdoor” in a system by replacing the login mechanism with an executable that accepts a secret login combination which in turn allows an attacker to access the system regardless of changes to the actual accounts on the system.

Most Trending Malware in the Last 2 Weeks

How Can You Detect Rootkits? Check for Rootkits with SpyHunter!

SpyHunter is a powerful malware remediation and protection tool designed to help provide users with in-depth system security analysis, detection and removal of a wide range of threats like Rootkits as well as a one-on-one tech support service.

Download SpyHunter's Malware Scanner to Detect Rootkits*
* Free Remover allows you, subject to a 48-hour waiting period, one remediation and removal for results found. Read our EULA, Privacy Policy & Special Discount Terms. See more Free SpyHunter Remover details.

There are currently 80 articles listed on rootkits.

Name Threat Level Detection Count Date
BackDoor-Spyeye!rootkit February 15, 2010
BDS/ZAccess.AL 1010/10 0 October 25, 2012
BDS/ZAccess.V 1010/10 0 August 23, 2012
Crisis 1010/10 0 August 22, 2012
Gen.Rootkit December 9, 2010
Generic Rootkit.ej March 2, 2010
Generic Rootkit.g 66/10 0 August 12, 2009
Hack Tool.HOC October 1, 2010
LoJax October 8, 2018
Mal/ZAccess-D 1010/10 0 December 12, 2011
MBR:Alureon-K [Rtk] December 2, 2011
MBR:Alureon-L 1010/10 0 December 20, 2012
Mebroot March 18, 2015
NTOSKRNL-HOOK July 22, 2009
Phase Bot 88/10 1 January 13, 2015
Podnuha!sd6 August 4, 2009
Rootkit TDSS.d 1010/10 0 August 23, 2011
Rootkit Win32.tdss.mbr November 10, 2010
Rootkit.0access.H 1010/10 0 March 7, 2012
Rootkit.Agent/Gen-Local June 3, 2011
Rootkit.Boot.Cidox.b 1010/10 0 May 29, 2012
Rootkit.Boot.Mybios.a August 22, 2011
Rootkit.Boot.Pihar.A 1010/10 0 November 18, 2011
Rootkit.Boot.Pihar.B 1010/10 0 November 18, 2011
Rootkit.Boot.Pihar.c 1010/10 0 August 6, 2012
1 2 3 4

Search by Letter:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9

Registered Office: 1 Castle Street, 3rd Floor, Dublin 2 D02XD82 Ireland.
EnigmaSoft Limited, Private Company Limited by shares, Company Registration Number 597114.

Copyright 2016-2020. EnigmaSoft Ltd. All Rights Reserved.

Mac and MacOS are trademarks of Apple Inc., registered in the U.S. and other countries.