Stealthy malware designed to hide its presence while maintaining privileged access to a system.
A rootkit is malware designed to maintain persistent, hidden access to a system with elevated privileges. Rootkits modify operating system components to hide their presence from security tools and administrators—concealing processes, files, network connections, and registry entries. They operate at deep system levels, sometimes in the boot process or even firmware, making detection and removal extremely difficult. Rootkits often arrive via other malware and enable ongoing access for attackers.
Why It Matters
The DSC Perspective:
Rootkits represent sophisticated, persistent compromise. Their stealth makes detection challenging—specialised tools are often required. If rootkit infection is suspected, rebuilding affected systems is often more reliable than attempted removal.
