answersLogoWhite

0


Best Answer

Hi,

A rootkit is some kind of a Trojan that gives a hacker/cracker the access to your computer without you knowing it. It can come in a zip file or while Surfing online. Once the rootkit is installed on your computer, it sends a message to the cracker that he/she can now access the host machine. Then the cracker can use that machine as if it was his own.

So why do crackers do it? Well, for starters the challenge is there. Being able to see someone else's computer/ files gives them some weird satisfaction. But more importantly they do it to acquire personal information about the host. (addresses, phone numbers, birthdays, email addresses, bank information etc.) Most of the time they sell this info to other parties that are willing to pay a lot of bucks for it. (although now we give it for free via websites like facebook, if you know what i mean:) ) Another reason is that since they are using someone else's computer, it gives them the freedom to do things that otherwise they would get into trouble with their own machines. (visiting child-porn, hacking websites or chatting/ cybersex with minors). I know people that got into trouble like that.

A rootkit is hard to detect by using conventional antivirus software. Google "anti rootkit software" and you'll run into a bunch of software out there. Run this software regularly on your machine and you should be fine.

User Avatar

Lisa Schaefer

Lvl 10
2y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is Rootkits?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

How do Rootkits work?

Rootkits dig deep into your system's vital functions and fill it with malicious files. These are really hard to get rid of, as it's deep in the system.


What is the purpose of rootkit?

A rootkit is a type of malicious software (malware) designed to gain unauthorized access to a computer system or network and maintain privileged, undetected access to that system. The primary purpose of a rootkit is to enable attackers to control the compromised system while avoiding detection by security mechanisms and antivirus software. Rootkits typically operate at a low level of the operating system, often directly interacting with the kernel or other core components, which gives them extensive control over the system's behavior. Here are some of the main purposes and functionalities of rootkits: 1. Stealth: Rootkits are designed to hide their presence and activities on the compromised system. They may employ techniques such as concealing files, processes, registry entries, and network connections from system administrators and security tools. 2. Privilege Escalation: Rootkits often exploit vulnerabilities in the operating system or software to gain escalated privileges, allowing them to perform actions that would otherwise be restricted to system administrators or root users. 3. Backdoor Access: Rootkits can create backdoors or remote access points on the compromised system, enabling attackers to remotely control the system, steal sensitive information, install additional malware, or use the system for malicious purposes. 4. Persistence: Rootkits aim to maintain long-term access to the compromised system by installing themselves persistently, even after system reboots or security measures are taken. They may modify system boot processes, system files, or registry settings to ensure their continued presence and functionality. 5. Data Theft and Surveillance: Some rootkits are designed to monitor user activities, capture sensitive information such as login credentials, banking details, or personal data, and send this information to remote servers controlled by attackers. 6. Distributed Denial of Service (DDoS) Attacks: Rootkits can be used as part of botnets—networks of compromised computers—to launch DDoS attacks against targeted websites, servers, or networks, causing disruption or downtime. Overall, the purpose of a rootkit is to facilitate unauthorized access, control, and manipulation of computer systems for malicious intent. Detecting and removing rootkits can be challenging due to their sophisticated evasion techniques and deep integration into the compromised system. Regular security measures such as antivirus software, intrusion detection systems, and system hardening practices are essential for protecting against rootkit attacks.


How the Trojan horse virus can be removed?

You need to run these 5 essential steps to remove all the spyware on your computer. 1. Run Deckard's System Scanner (DSS) 2. Run Malwarebytes Anti-Malware 3. Run the anti spyware removal programs spybot 4 Run Superantispyware 5. Run a complete scan with free curing utility Dr.Web CureIt! Install ThreatFire ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.


Remove Trojan agent aufu?

You need to run these 3 essential programs to remove all the spyware on your computer. If you do not have an internet security suit and only an anti virus 1. Run Malwarebytes Anti-Malware 2. Run a complete scan with free curing utility Dr.Web CureIt! 3. Run the anti spyware removal programs spybot or Superantispyware Browsers Use Mozilla firefox or the google chrome browser for browsing unsafe websites Install ThreatFire ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware. Install a good antivirus in your computer. Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them. Keep your permanent antivirus protection enabled at all times.


How do you get rid of Trojan Horse BackDoor.Agent.zcd?

You need to run these 3 essential programs to remove all the spyware on your computer. If you do not have an internet security suit and only an anti virus 1. Run Malwarebytes Anti-Malware 2. Run a complete scan with free curing utility Dr.Web CureIt! 3. Run the anti spyware removal programs spybot or Superantispyware Browsers Use Mozilla firefox or the google chrome browser for browsing unsafe websites Install ThreatFire ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware. Install a good antivirus in your computer. Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them. Keep your permanent antivirus protection enabled at all times.

Related questions

Are computer viruses worms and Trojan horses and rootkits malware that act without the users knowledge?

computer viruses, worms, Trojan horses, and rootkits


How do Rootkits work?

Rootkits dig deep into your system's vital functions and fill it with malicious files. These are really hard to get rid of, as it's deep in the system.


Why should all application be closed before scanning for rootkits?

applications are to be closed before scanning for rootkits. The trojan horse will be able to infect your data. Trust me I am IT


What type of virus that can affect the kernel of the PC?

rootkits


What are the different types of malware?

* Mobile-Threats * Crimeware * Rootkits * Viruses * Spyware * Phishing * Spam


Rootkit are they dangerous?

yes, Rootkits belong to malware that include certain programs undiscovered so as to destroy computer system. Usually, it is hard to find out Rootkit because it cannot only hide itself but also virus, malware or spyware. Although Rootkits are used with good will initially, hackers turn them into malware and then attack others' computer. Once affected Rootkits, your computer may be suffered from inexplicable problems even unable to boot up.


What on a computer are kernel level rootkits designed to do?

1) To hide evidence of an attacker's presence 2) To hide a back door into the system


Is root kit a virus and is it dangerous and how can you remove it?

A rootkit is a collection of programs that enable administrator-level access to your computer. A rootkit may consist of spyware and other programs that create a "backdoor" into the system for the hacker. So basically, a rootkit is a way for hackers to gain access to your computer so that they can create get more viruses behind your firewall. Yes, rootkits are dangeroes. Rootkits are very hard to get rid of, because once they're there, they can "hide themselves". You can never really be sure if you have rootkits or not, because they often don't cause so much trouble. In modern times, rootkits are used as spyware to find private information, such as credit card numbers. The only way to really get rid of a rootkit is to completely erase the computer's hard drive and reinstall the operating system.


Are computer virus worms Trojan horses and rootkits all malware that acts without a user's knowledge?

They are all malware; however, none of these act without a user's knowledge by definition (though rootkits typically do attempt to hide themselves). Nonetheless, many viruses, worms, trojans, and rootkits do attempt to hide themselves from users; some of them do so quite well, and others are rather unsuccessful. Viruses which fail to run, returning error messages instead, for example, may alert users to their presence in this manner.


What kind of antivirus software that can detect the stealth virus?

You need to get a software called Malwarebytes to remove malware, including viruses, Trojans, spyware, adware and rootkits from your computer.


What is NtmsDataoexe?

NTMSDATA.EXE is like viruses, spyware, adware, trojans, rootkits, worms, information stealers, keyloggers, bots, and other forms of malicious threats that may reside on your PC.


Get rid of a virus using run?

I would just download a virus software specialist like vast of avg, malwarebytes etc and do a full boot scan inclduing all rootkits