Rootkits (2024)

What is a rootkit

A rootkit is a set of malicious applications, which allows an adversary to access privileged software areas on a machine while at the same time hiding its presence. Note, by machine, we mean the full spectrum of IT systems from smartphones to Industrial Control Systems. Stuxnet, Machiavelli, SONY BMG copy protection are some of the most popular case studies of a rootkit attack.

A rootkit is installed on a system as part of a malware infection. While there are many attack vectors for malware, usually it is an untrusted source, like a warez website, or an email attachment from unknown sender. In some cases, it could be also a malicious person or compromised server through web applications that injects the malware.

The main purpose of rootkits is to mask malware payloads effectively and preserve their privileged existence on the system. For that reason, a rootkit will conceal files, malware processes, injected modules, registry keys, user accounts or even system registries running on system boot.

Rootkits are spread in many types of systems, from smartphones to Industrial Control Systems. Stuxnet, Machiavelli, SONY BMG copy protection are some of the most popular case studies of a rootkit attack.

Types of rootkits

We classify rootkits according to the place of their injection; A rootkit may reside in application, kernel, hypervisor or hardware. The list below is ordered from easiest to inject, detect and remove to most sophisticated and much harder to detect and remove.

• Applications

Simple rootkits run in user-mode and are called user-mode rootkits. Such rootkits modify processes, network connections, files, events and system services. It is the only type of rootkit that could be detected by a common antivirus application.

• Kernel

Rootkits that run in the kernel, also known as kernel-mode rootkits, can alter the entire operating system. Such modifications in the kernel aim to the concealment of the compromise. Therefore, the detection of a kernel rootkit becomes extremely hard. Different techniques exist to alter a system’s kernel.

• Hypervisor

A hypervisor rootkit takes advantage of the hardware virtualization and is installed between the hardware and the kernel acting as the real hardware. Hence, it can intercept the communication/requests between the hardware and the host operating system. Common detection applications that run in user or kernel mode are not effective in this case as the kernel may not know whether it is executed on the legitimate hardware.

• Firmware / Hardware

The firmware is a small piece of low-level software that controls a device. The Firmware is tiny and in most cases updateable, even though is not modified often. A firmware rootkit can alter firmware of some real interactive hardware that runs firmware code to perform specific functions, such as the BIOS, CPU and GPU. Since only advanced rootkits could reach from kernel level to firmware level, firmware integrity checks are performed very rarely.

Detection mechanisms

Detection of rootkits is considered a complicated problem in computer security, but also depends on the level of sophistication in each particular case. Like in other malware detection mechanisms, signature and behavioural based techniques are utilized. Other techniques used for detection of rootkits are the diff-based analysis and integrity checks. There is no single application that could detect and remove all kinds of rootkits as the area they might reside could be completely different, software or hardware. In most cases, a rootkit can be removed only by rebuilding the compromised system.

• Signature-Based

This is the most common technique for malware detection. However, it is the least efficient as it is only effective for already detected and wide-spread rootkits. Signatures from known rootkits are used to detect if any of them exist on a system.

• Behavioural-Based

These detectors identify a abnormal behaviour on a computer system based on heuristics and behavioural patterns. These patterns are derived from certain activities typically found in rootkits. The advantage of the behavioural based technique compared to the previous one, is that it may detect previously unknown rootkits.

• Diff-Based / Cross view

The Diff-Based or Cross view approach is used mostly to detect kernel-mode rootkits by comparing two different views of the system for the same information by traversing the data structures. In this case, the rootkit detector will get a view of the system and a view obtained from system utilities and then compare them. A difference in the results returned by the two approaches signals the presence of a rootkit.

• Integrity check

Integrity checks can be performed in a system to check for unauthorized code alteration in system files. First, there is the need to run a one way function to calculate a hash for every system file when the system is still clean and then use it as baseline. When the need arises, a hash comparison is performed between the baseline hashes and the current version’s hashes.

Rootkits (2024)
Top Articles
What Management Accountants Do
When Should I Buy a House? 8 Signs You're Ready | Bankrate
Craigslist St. Paul
Rek Funerals
Evil Dead Rise Showtimes Near Massena Movieplex
Puretalkusa.com/Amac
Nm Remote Access
6001 Canadian Ct Orlando Fl
Chic Lash Boutique Highland Village
Cvb Location Code Lookup
Teenleaks Discord
Apne Tv Co Com
Cashtapp Atm Near Me
Jellyfin Ps5
Yard Goats Score
Laveen Modern Dentistry And Orthodontics Laveen Village Az
Used Safari Condo Alto R1723 For Sale
Craigslist Houses For Rent In Milan Tennessee
Weve Got You Surrounded Meme
Sadie Sink Reveals She Struggles With Imposter Syndrome
Crossword Help - Find Missing Letters & Solve Clues
Chime Ssi Payment 2023
Marquette Gas Prices
WRMJ.COM
Cable Cove Whale Watching
Craigslist Northern Minnesota
Pokémon Unbound Starters
Otis Inmate Locator
Craig Woolard Net Worth
Swimgs Yuzzle Wuzzle Yups Wits Sadie Plant Tune 3 Tabs Winnie The Pooh Halloween Bob The Builder Christmas Autumns Cow Dog Pig Tim Cook’s Birthday Buff Work It Out Wombats Pineview Playtime Chronicles Day Of The Dead The Alpha Baa Baa Twinkle
Garrison Blacksmith's Bench
2016 Honda Accord Belt Diagram
Boggle BrainBusters: Find 7 States | BOOMER Magazine
Raisya Crow on LinkedIn: Breckie Hill Shower Video viral Cucumber Leaks VIDEO Click to watch full…
Dadeclerk
Devotion Showtimes Near The Grand 16 - Pier Park
Bones And All Showtimes Near Johnstown Movieplex
9 oplossingen voor het laptoptouchpad dat niet werkt in Windows - TWCB (NL)
sacramento for sale by owner "boats" - craigslist
The best bagels in NYC, according to a New Yorker
[Teen Titans] Starfire In Heat - Chapter 1 - Umbrelloid - Teen Titans
How the Color Pink Influences Mood and Emotions: A Psychological Perspective
Tropical Smoothie Address
Plumfund Reviews
2000 Ford F-150 for sale - Scottsdale, AZ - craigslist
Bedbathandbeyond Flemington Nj
French Linen krijtverf van Annie Sloan
Costco Gas Price Fort Lauderdale
When Is The First Cold Front In Florida 2022
Philasd Zimbra
Saw X (2023) | Film, Trailer, Kritik
Latest Posts
Article information

Author: Fr. Dewey Fisher

Last Updated:

Views: 6416

Rating: 4.1 / 5 (42 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Fr. Dewey Fisher

Birthday: 1993-03-26

Address: 917 Hyun Views, Rogahnmouth, KY 91013-8827

Phone: +5938540192553

Job: Administration Developer

Hobby: Embroidery, Horseback riding, Juggling, Urban exploration, Skiing, Cycling, Handball

Introduction: My name is Fr. Dewey Fisher, I am a powerful, open, faithful, combative, spotless, faithful, fair person who loves writing and wants to share my knowledge and understanding with you.