R

Rootkits

Rootkits are stealthy malicious tools designed to hide malware, maintain privileged access, and evade detection by modifying operating system or firmware components.

What are rootkits?

Rootkits are a class of malicious software whose primary purpose is concealment. They enable attackers to hide the presence of malware, backdoors, or unauthorized access by altering low-level components of a system.

Unlike typical malware, rootkits focus less on direct damage and more on long-term stealth and control, often operating with elevated privileges.

Why rootkits matter

Rootkits are particularly dangerous because they:

  • Obscure malicious processes, files, and registry entries
  • Bypass or disable security controls
  • Allow attackers to maintain persistent, privileged access
  • Complicate forensic analysis and incident response
  • Can survive reboots and, in some cases, OS reinstallation

A compromised system with a rootkit cannot be trusted until fully rebuilt.

Common types of rootkits

Rootkits are classified by the level at which they operate:

1) User-mode rootkits

  • Operate at application level
  • Hook APIs to hide files, processes, or network connections
  • Easier to detect but still effective against basic defenses

2) Kernel-mode rootkits

  • Run with kernel-level privileges
  • Modify core OS components or drivers
  • Extremely difficult to detect without specialized tools

3) Bootkits

  • Infect the bootloader or early boot process
  • Execute before the operating system loads
  • Can bypass many endpoint protections

4) Firmware rootkits

  • Persist in BIOS/UEFI, network cards, or storage firmware
  • Survive OS reinstallations and disk replacement
  • Represent a worst-case persistence scenario

5) Hypervisor-level rootkits

  • Operate below the OS using virtualization
  • Control the system invisibly from a lower layer

How rootkits are installed

Rootkits are typically deployed after:

  • Privilege escalation to administrator or root level
  • Exploitation of kernel vulnerabilities
  • Installation of malicious drivers
  • Supply chain attacks affecting firmware or signed components

They are rarely the initial attack vector and usually follow a successful foothold.

Rootkits vs backdoors vs malware

These concepts are related but distinct:

  • Malware: umbrella term for malicious software
  • Backdoor: hidden access mechanism
  • Rootkit: stealth layer that hides malware and backdoors

In practice, attackers often combine all three.

Indicators of rootkit presence

Rootkits aim to remain invisible, but possible indicators include:

  • Inconsistent system behavior or crashes
  • Security tools unexpectedly disabled or blind
  • Discrepancies between OS-level and raw disk/network views
  • Unsigned or suspicious kernel drivers
  • Abnormal boot behavior

Detection often requires offline scanning or trusted boot environments.

How to defend against rootkits

Effective mitigation strategies include:

  • Secure Boot and hardware-backed boot integrity
  • Kernel-mode code signing enforcement
  • Regular patching of OS and firmware
  • EDR/XDR solutions with kernel visibility
  • Firmware integrity checks and attestation
  • Rebuilding systems from trusted media after confirmed infection

In many cases, full system reimaging is the only safe remediation.

Common misconceptions

  • "Antivirus will always detect rootkits"
  • "Reinstalling the OS removes all rootkits"
  • "Rootkits are only used in nation-state attacks"
  • "Cloud workloads cannot be affected by rootkit-like persistence"