![[whitepaper] how to uproot rootkit threats 1 02 scaled brandefense](https://brandefense.io/wp-content/uploads/2022/02/02-scaled.jpg.webp)
![[whitepaper] how to uproot rootkit threats 2 image link](https://brandefense.io/wp-content/uploads/2022/07/rootkit-mockup.png.webp)
BrandefenseDigital Risk Protection Service
Rootkits are closely related to other malware types and typically installed by trojans, viruses, or other malware. The most distinctive features that distinguish it from other malware are effort to, persistence, and being stealthy.
Hackers use rootkits to gain administrator–level privileges on a system, which they can then use to steal sensitive information, install other malware, or sabotage the system. Rootkits are difficult to detect and remove because they often disguise themselves as legitimate files or programs. Additionally, rootkits can persist even after a system has been rebooted, making them even more resistant to detection and removal.
Once installed, rootkits can hook into the operating system kernel and intercept system calls allowing them to hide from security scanners and other tools used to detect and remove malware.
Cyber Threat Intelligence Team