UK tech experts · info@vividrepairs.co.uk
Vivid Repairs

Glossary/cybersecurity

Rootkit

Malicious software that gains administrator-level access to a device, hiding itself and other programmes from detection whilst giving attackers control.

Also known as: root kit, kernel rootkit, bootkit

A rootkit is malware designed to obtain and maintain high-level (root or administrator) access to a computer or mobile device without the user's knowledge or consent. Once installed, it conceals itself, other malware, and attacker activity from security tools, operating systems, and users.

Rootkits work by modifying core system files or kernel-level code. This deep integration makes them exceptionally difficult to detect and remove, because the operating system itself has been compromised. A rootkit can hide running processes, files, network connections, and system modifications from antivirus software and legitimate monitoring tools.

How they spread

  • Phishing emails with malicious attachments
  • Compromised websites and software downloads
  • Unpatched software vulnerabilities
  • USB devices or physical access
  • Bundled with other malware or pirated software

Why they matter

Rootkits are particularly dangerous because attackers can use them to steal passwords, financial data, and personal information. They can persist across reboots, remain active for months or years, and leave no obvious signs of compromise. Some rootkits spy on users; others create backdoors for remote access or turn infected devices into botnets.

Detection and prevention

Standard antivirus software often cannot detect rootkits operating at the kernel level. Prevention is more effective than removal: keep your operating system and software patched, avoid downloading from untrusted sources, and use reputable security tools. If you suspect a rootkit infection, professional help or a complete system reinstall may be necessary.