Overview

Rootkits are among the most difficult types of malware to detect and remove because they operate at a deep level within the operating system (often the kernel). They can hide files, network connections, and even themselves from security tools.

Purpose

  • Maintaining persistent, hidden access to a compromised system.
  • Stealing sensitive data.
  • Using the system as part of a botnet.

Detection and Removal

Often requires specialized tools or even a complete reinstallation of the operating system, as the rootkit can subvert the OS's own reporting mechanisms.

Related Terms