The low-down on low-level rootkits

A new post from Microsoft's malware blog offers statistics and details about the insidious stealth malware.

Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools.

As noted in Microsoft's post, "getting hit by a live rootkit infection is among the more unfortunate fates that can befall an unsuspecting computer user." The company says it found low-level rootkits in about 7 percent of the infected computers it encountered. Low-level rootkits are those that attempt to modify the core of an operating system to hide its components, along with other installed malware.

The post covers the most commonly found rootkit families, and lists some of the places where rootkits commonly install files. As notes, those files will likely be hidden from normal view on an infected system, and require using a specialized rootkit scanner such as AVG Anti-Rootkit. Many antivirus programs also include rootkit scanners.

Rootkits can be highly difficult to remove once installed, as stated in Microsoft's blog. Your best bet by far is to practice good basic security and catch them before they can dig in.

CHANNEL CHOICE: Vote Now for your favourite in the three categories: Vendor, Distributor and Reseller. Voting closes August 8.

Tags securityMicrosoftrootkitsmalware

More about AVG Technologies AUMicrosoft

ARN Directory | Distributors relevant to this article

Comments

Comments are now closed

 

Latest News

09:49AM
Xiaomi's Mi4 brings a touch of Apple to the open world of Android
03:38PM
Scott Leader new executive director A/NZ for Pegasystems
12:20PM
Zendesk expands Melbourne operation
12:18PM
Planet Tel acquires Via IP to move into wholesale aggregation
More News
24 Jul
Veeam’s Crazy 8 Roadshow
24 Jul
The Rise of the Challenger Marketer
24 Jul
Executive Sales Breakfast Briefing
24 Jul
Dell Connected Security: Listen to what the experts have to say about security
View all events