Rootkit

A rootkit is a collection of software tools that cybercriminals use to gain undetected access to all privileges (administrator rights) on a computer or network.

 

What does that mean in detail?

In certain operating systems, ‘root’ is the term used to refer to the administrator, i.e. the user who has all privileges.

A rootkit is designed to give cybercriminals all the privileges of the root user. Rootkits now exist for almost all operating systems, even those where the administrator is not referred to as ‘root’. However, the principle behind them is the same.

Since rootkits give cybercriminals administrator rights, compromised systems can be used for many cyber incidents: to spy on the affected computer or its network, to steal documents and passwords, for further attacks on new targets, and for DDoS attacks.

Rootkits are programmed to cover their digital tracks. This is because cybercriminals want to hide the existence of the rootkit from the legitimate users of the compromised system. Rootkits cannot spread on their own. Other malware is used for this purpose, e.g. infected email attachments. Rootkits are essentially malware. In the field of copy protection, companies such as Sony have also used rootkit technology. They came under criticism for this, as the mere presence of a rootkit in a system constitutes a security vulnerability.

Because rootkits can penetrate very deeply into the compromised system, they are very difficult to detect and remove. Even very good antivirus programmes can be fooled by rootkits.

 

Where do I encounter this issue in my everyday work?

Since rootkits are designed to be as inconspicuous as possible, you are unlikely to encounter them in your everyday work – even if your computer is infected. It is more likely that you will hear about a scandal involving companies that have used rootkit technology.

 

What can I do to improve my security?

Many measures designed to reduce cyber risk also reduce the risk of a rootkit being installed on your computer or in your system. Since rootkits can be transmitted via strategically placed ‘forgotten’ USB sticks, among other things, it is very important to raise awareness among employees.

Detecting and removing existing rootkits is complex. Talk to your IT department about this specifically.