What is Rootkit? Definition & Explanation

A rootkit is a stealthy form of malware designed to maintain persistent, privileged access to a computer while actively hiding its presence from users, administrators, and security tools. Rootkits operate at the kernel, bootloader, firmware, or hypervisor level — often surviving OS reinstallation.

In-Depth Explanation

Rootkits are categorized by privilege depth: user-mode (intercept API calls, easiest to detect), kernel-mode (subvert OS through driver loading or DKOM, requires signed-driver bypass on modern Windows), bootkits (infect MBR/GPT/UEFI before OS loads — examples include MoonBounce, MosaicRegressor, BlackLotus which bypassed Secure Boot), firmware rootkits (LoJax, Fanny — persist in UEFI flash and survive disk wipes), and hypervisor rootkits (BluePill concept, virtualize the host OS underneath). Modern Windows rootkit attacks frequently use BYOVD (Bring Your Own Vulnerable Driver) — loading a legitimately-signed but vulnerable driver to gain kernel execution and disable EDR. Detection and removal is extraordinarily difficult and typically requires offline forensic imaging, memory analysis (Volatility/Rekall), UEFI flash inspection (CHIPSEC), and often hardware replacement for firmware-level infections. Defenses include Secure Boot with measured boot (TPM PCR validation), Microsoft's vulnerable driver blocklist, kernel-mode code integrity (HVCI), and EDR products with anti-tampering protections.

Why It Matters for Security

Rootkits represent the most persistent and dangerous class of malware — once installed at firmware or kernel level, an attacker maintains access through full disk wipes, OS reinstalls, and even hardware replacement (for some firmware variants). Nation-state actors deploy rootkits in long-term espionage campaigns, while ransomware groups increasingly use BYOVD rootkits to disable EDR before encrypting. Modern hardware-rooted security (Secure Boot, TPM, HVCI) is the only effective defense.

Related Tools

Frequently Asked Questions

What does Rootkit mean in cybersecurity?

A rootkit in cybersecurity is a stealthy form of malware designed to maintain persistent, privileged access to a system while hiding from users, administrators, and security tools — often operating at the kernel, bootloader, firmware, or hypervisor level.

Why is Rootkit important?

Rootkits matter because they are the most persistent malware class — firmware and bootkit variants can survive OS reinstallation and even hard-drive replacement. Nation-state actors and modern ransomware groups deploy rootkits to disable EDR; only hardware-rooted defenses (Secure Boot, TPM, HVCI) reliably defeat them.

← Back to the full Cybersecurity Glossary