Rootkits

A rootkit is a software system that consists of a program or combination of several programs designed to hide or obscure the fact that a computer system has been compromised. Contrary to what its name implies a rootkit does not grant you administrator access as it requires prior access to execute and tamper with security files and processes.

A hacker may attempt to use a rootkit to replace vital system executables which may then be used to hide processes and files the hacker has installed along with the presence of the rootkit. A rootkit is intended to seize control of the operating system. Typically rootkits act to obscure their presence on the system through subversion or evasion of standard operating system security mechanisms.

Often they are Trojans as well thus fooling users into believing they are safe to run on their systems. Rootkits may also install a “backdoor” in a system by replacing the login mechanism with an executable that accepts a secret login combination which in turn allows an attacker to access the system regardless of changes to the actual accounts on the system.

How Can You Detect Rootkits? Check for Rootkits with SpyHunter!

SpyHunter is a powerful malware remediation and protection tool designed to help provide users with in-depth system security analysis, detection and removal of a wide range of threats like Rootkits as well as a one-on-one tech support service.

* Free Remover allows you, subject to a 48-hour waiting period, one remediation and removal for results found. Read our EULA, Privacy Policy & Special Discount Terms. See more Free SpyHunter Remover details.

There are currently 81 articles listed on rootkits.

Name Threat Level Detection Count Date
Rootkit.Boot.Pihar.c 1010/10 0 August 6, 2012
Rootkit.Boot.Sst.A 88/10 3 November 18, 2011
Rootkit.Boot.Sst.B 88/10 0 November 18, 2011
Rootkit.Boot.STT.a 1010/10 0 August 10, 2012
Rootkit.CeidPageLock 1010/10 1 November 28, 2019
Rootkit.Cidox.G.VBR 11/10 82 November 17, 2014
Rootkit.HareBot 1010/10 0 April 2, 2010
Rootkit.Kryptik.FW 88/10 135 December 8, 2011
Rootkit.MBR.Mayachok.B 88/10 1 June 19, 2014
Rootkit.Necurs.lb November 20, 2015
Rootkit.Order January 18, 2010
Rootkit.Pakes.or April 6, 2009
Rootkit.Podnuha.cbn March 11, 2009
Rootkit.Small.ra 1010/10 0 February 15, 2009
Rootkit.TDSS 88/10 0 March 22, 2009
Rootkit.Tiny.cr 88/10 0 March 11, 2009
Rootkit.TmpHider 88/10 0 July 20, 2010
Rootkit.Win32.Agent.bhnc July 1, 2011
Rootkit.Win32.Agent.bjrv December 1, 2010
Rootkit.Win32.Agent.bkwm December 10, 2010
Rootkit.Win32.Agent.gpe 1010/10 0 July 10, 2008
Rootkit.Win32.Agent.uok October 27, 2009
Rootkit.Win32.Necurs.gen 1010/10 0 September 11, 2012
Rootkit.ZeroAccessJP 1010/10 737 November 28, 2019
Rustock CV March 25, 2009

Search by Letter:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9