A rootkit is a software system that consists of a program or combination of several programs designed to hide or obscure the fact that a computer system has been compromised. Contrary to what its name implies a rootkit does not grant you administrator access as it requires prior access to execute and tamper with security files and processes.
A hacker may attempt to use a rootkit to replace vital system executables which may then be used to hide processes and files the hacker has installed along with the presence of the rootkit. A rootkit is intended to seize control of the operating system. Typically rootkits act to obscure their presence on the system through subversion or evasion of standard operating system security mechanisms.
Often they are Trojans as well thus fooling users into believing they are safe to run on their systems. Rootkits may also install a “backdoor” in a system by replacing the login mechanism with an executable that accepts a secret login combination which in turn allows an attacker to access the system regardless of changes to the actual accounts on the system.
How Can You Detect Rootkits? Check for Rootkits with SpyHunter!
SpyHunter is a powerful malware remediation and protection tool designed to help provide users with in-depth system security analysis, detection and removal of a wide range of threats like Rootkits as well as a one-on-one tech support service.
Free SpyHunter Remover Details & Terms
There are currently 81 articles listed on rootkits.
|Name||Threat Level||Detection Count||Date|
|Scranos||April 16, 2019|
|Snake Rootkit||10/10||0||March 13, 2014|
|Suspicious.Cloud.9||9/10||0||March 28, 2014|
|SVC:MBAMSwissArmy Rootkit||10/10||0||September 5, 2012|
|TDL3 Rootkit||July 18, 2012|
|TDL4 Rootkit||November 23, 2011|
|TDSS.d!men||August 12, 2011|
|TDSS.e!rootkit||July 11, 2011|
|TR/Rootkit.Gen2||8/10||16||December 28, 2011|
|Trojan Rootkit Tmphider||November 14, 2011|
|Uroboros||8/10||3||October 31, 2014|
|Uroburos||March 13, 2014|
|Win32: Tiny-AMB||1/10||570||October 31, 2011|
|Win32:Aluroot-C||10/10||0||June 25, 2012|
|WIN32:MBRootkit||8/10||1||December 14, 2011|
|Win32:Necurs-E||10/10||0||September 5, 2012|
|Win32:Rootkit-gen||July 18, 2011|
|Win32:Sirefef-AO||10/10||0||May 22, 2012|
|Win32:Sirefef-HO||10/10||0||March 8, 2012|
|Win32:Sirefef-PL||10/10||0||May 28, 2012|
|Win32.TDSS.rtk||August 17, 2009|
|Win32.Zaccess.av||8/10||0||December 8, 2011|
|Win32/Olmarik.AWO||2/10||9||December 28, 2011|
|Win32/Olmarik.AWT||8/10||1||December 28, 2011|
|Win32/Olmasco.O||8/10||22||December 28, 2011|