Rootkits Role Play in Malware Attacks - PowerPoint PPT Presentation

About This Presentation
Title:

Rootkits Role Play in Malware Attacks

Description:

A rootkit is a collection of computer software, typically malicious, designed to enable access to, Obtaining this access is a result of direct attack on a system, i.e. exploiting a known vulnerability (such as privilege escalation) or a password.Get more information at – PowerPoint PPT presentation

Number of Views:70

less

Transcript and Presenter's Notes

Title: Rootkits Role Play in Malware Attacks


1
ROOTKITS ROLE PLAY IN MALWARE ATTACKS
2
Introduction
Origin and Mission of Rootkits Examples of known
rootkits What sets rootkits apart from other
malware? Protect yourself against rootkits
POINTS OF DISCUSSION
3
INTRODUCTION
If your data center tells you they need to
re-install the operating system onto one of your
servers, theres a good chance its due to a
rootkit. Malicious rootkits are one of the most
dangerous tools that cybercriminals use.
4
(No Transcript)
5
ORIGIN AND MISSION OF ROOTKITS
The term rootkit originates from root in
UNIX-based operating systems, which is the most
privileged administration account in the system.
With root-level access, uses can do virtually
anything on the system. As for the kit in
rootkit, its just an abbreviation of the word
toolkit.
6
EXAMPLES OF KNOWN ROOTKITS
  • Lane Davis and Steven Dake - wrote the earliest
    known rootkit in the early 1990s.
  • NTRootkit one of the first malicious rootkits
    targeted at Windows OS.
  • HackerDefender this early Trojan
    altered/augmented the OS at a very low level of
    functions cal s.

7
Stuxnet - the first known rootkit for industrial
control systems. Flame - a computer malware
discovered in 2012 that at acks computers
running Windows OS. It can record audio,
screenshots, keyboard activity and network traf
ic.
8
WHAT SETS ROOTKITS APART FROM OTHER MALWARE?
For obvious reason, rootkits are also known as
stealth viruses, although they do not fit the
definition of a virus. But how do rootkits
differ exactly from other types of malware?
9
Virus A virus at aches itself to an executable
file or program. Although it replicates itself
autonomously, its not able to spread further on
its own, but usual y only with the help of
people or other programs. Worm This term refers
to a special sub-class of computer virus that
can spread independently using a systems data
transmission functions.
10
Rootkits The rootkit is considered to be a type
of Trojan horse. Many Trojan horses exhibit the
characteristics of a rootkit. The main difference
is that rootkits actively conceal themselves in
a system and also typically provide the hacker
with administrator rights.
11
PROTECT YOURSELF AGAINST ROOTKITS
Ensure your system is properly patched. Dont
download unknown files Dont open email
attachments from unknown senders In addition to
the above tips, you can mount an even stronger
defense against rootkits by installing an
antivirus.
12
CONTACT US
  • Email info_at_reasonsecurity.com
  • Website www.reasonsecurity.com

13
THANK YOU!
Write a Comment
User Comments (0)
About PowerShow.com