Rootkits–malicious software that operates in a stealth fashion by hiding its files, processes and registry keys–have grown over the past five years from 27 components to 2,400, according to McAfee’s Rootkits Part 2: A Technical Primer (PDF).
“The trend is it used to be rootkit A was used, but now it’s different components in different rootkit malware,” said Dave Marcus, security researcher and communications manager for McAfee Avert Labs. “Now, there are more ways attackers can use these components to hide their malware.”
Attackers use rootkits to hide their malicious software, which can range from spyware to keylogger software that can steal sensitive information from users’ computers. The rootkits can then be used to create a hidden directory or folder designed to keep it out of view from a user’s operating system and security software.
View: Full Story @ News.com