Title: Rootkits Role Play in Malware Attacks
1ROOTKITS ROLE PLAY IN MALWARE ATTACKS
2Introduction
Origin and Mission of Rootkits Examples of known
rootkits What sets rootkits apart from other
malware? Protect yourself against rootkits
POINTS OF DISCUSSION
3INTRODUCTION
If your data center tells you they need to
re-install the operating system onto one of your
servers, theres a good chance its due to a
rootkit. Malicious rootkits are one of the most
dangerous tools that cybercriminals use.
4(No Transcript)
5ORIGIN AND MISSION OF ROOTKITS
The term rootkit originates from root in
UNIX-based operating systems, which is the most
privileged administration account in the system.
With root-level access, uses can do virtually
anything on the system. As for the kit in
rootkit, its just an abbreviation of the word
toolkit.
6EXAMPLES OF KNOWN ROOTKITS
- Lane Davis and Steven Dake - wrote the earliest
known rootkit in the early 1990s. - NTRootkit one of the first malicious rootkits
targeted at Windows OS. - HackerDefender this early Trojan
altered/augmented the OS at a very low level of
functions cal s.
7Stuxnet - the first known rootkit for industrial
control systems. Flame - a computer malware
discovered in 2012 that at acks computers
running Windows OS. It can record audio,
screenshots, keyboard activity and network traf
ic.
8WHAT SETS ROOTKITS APART FROM OTHER MALWARE?
For obvious reason, rootkits are also known as
stealth viruses, although they do not fit the
definition of a virus. But how do rootkits
differ exactly from other types of malware?
9Virus A virus at aches itself to an executable
file or program. Although it replicates itself
autonomously, its not able to spread further on
its own, but usual y only with the help of
people or other programs. Worm This term refers
to a special sub-class of computer virus that
can spread independently using a systems data
transmission functions.
10Rootkits The rootkit is considered to be a type
of Trojan horse. Many Trojan horses exhibit the
characteristics of a rootkit. The main difference
is that rootkits actively conceal themselves in
a system and also typically provide the hacker
with administrator rights.
11PROTECT YOURSELF AGAINST ROOTKITS
Ensure your system is properly patched. Dont
download unknown files Dont open email
attachments from unknown senders In addition to
the above tips, you can mount an even stronger
defense against rootkits by installing an
antivirus.
12CONTACT US
- Email info_at_reasonsecurity.com
- Website www.reasonsecurity.com
13THANK YOU!