Rootkits

Rootkits are infections that contain a program or a group of programs usually programmed to go undetected in order to take control of a computer. In some cases, a rootkit may come in the form of a Trojan presented in a way that makes computer users believe that it is a safe program to execute or run. Rootkits were originally designed to be programs that have the ability to take control or gain access of a failing system. Hackers can take a legitimate rootkit and turn it into malware that can potentially take over a system where it will execute undetected malicious or illegal actions.

A Rootkit was originally a legitimate application designed to take control of an unresponsive or failing system. Hackers have taken the rootkit’s undetected access capabilities to spread malware. A rootkit such as Rootkit.Gen has the ability to hide connections, files and process. When used for malicious intent a hacker is able to submit commands that ultimately control the functions of a computer where it may be used for illegal actions or to simply spread malicious files or programs. Rootkits are known to affect many types of computers including ones running Windows, Mac OS and even Linux.

Rootkits can go undetected by many antivirus or security applications. It is importation to utilize a tool that is designed to detect and remove rootkits so that you are able to identify the infected files. A rootkit can be successfully removed if the proper actions are taken.

Is Your PC Infected with Rootkits?

To safely & quickly detect Rootkits, we highly recommend you click below to run SpyHunter's up-to-date malware scanner.

Download SpyHunter's* Spyware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria.

There are currently 91 rootkits program(s) in our database.

Name Date
Agent.BVCO July 24, 2009
Agent.gmj July 24, 2009
Agent.kqq July 24, 2009
Agent.sd5 July 24, 2009
Avatar Rootkit May 2, 2013
BackDoor-Spyeye!rootkit February 15, 2010
BDS/ZAccess.AL October 25, 2012
BDS/ZAccess.V August 23, 2012
BlackEnergy July 4, 2014
CEIDPageLock August 31, 2018
Crisis August 22, 2012
DOS/Rovnix.W September 1, 2014
Gen.Rootkit December 9, 2010
Generic Rootkit.ej March 2, 2010
Hack Tool.HOC October 1, 2010
LoJax October 8, 2018
Mal/FakeVirPk-B January 5, 2010
Mal/ZAccess-D December 12, 2011
MBR:Alureon-K [Rtk] December 2, 2011
MBR:Alureon-L December 20, 2012
NTOSKRNL-HOOK July 22, 2009
Phase Bot January 13, 2015
Podnuha!sd6 August 4, 2009
Rootkit Win32.tdss.mbr November 10, 2010
Rootkit.0access.H March 7, 2012
1 2 3 4

Search by Letter:
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  0  1  2  3  4  5  6  7  8  9  

Home Malware Programs Rootkits