Laserfiche WebLink
What Is a Rootkit? How to Defend and Stop Them? I Fortinet https://www.fortinet.com/resources/cyberglossary/rootkit#:-•:text=... <br />vulnerabilities and use exploit code to attack a machine, then install a rootkit and other <br />components that give them remote access. <br />Another common rootkit installation method is through infected universal serial bus (USB) <br />drives that attackers leave in public places in the hope that unwitting victims will pick them up <br />and plug them into a machine. The malware hidden on a USB drive will then install as part of an <br />application or file that appears to be legitimate. <br />However, rootkits are not only used for malicious purposes. They are also used by organizations <br />and law enforcement to monitor employees, which enable them to investigate machines and <br />counter possible cyber threats. <br />There are several rootkit virus types that give attackers different routes into computers and <br />enable them to steal data from users. <br />A firmware rootkit, also known as a hardware rootkit, typically aims to infect a computer's hard <br />drive and basic input/output system (BIOS), the software installed onto a small memory chip in <br />the motherboard. Some firmware rootkits can be used to infect a user's router, as well as <br />intercept data written on hard disks. <br />tI * t '` . rt <br />A bootloader is an important element of any computer and is central to a machine booting up. <br />The special OS software Toads in the memory of a computer after it starts up and is typically <br />launched by a compact disc (CD) or digital versatile disc (DVD), hard drive, or USB stick, which <br />tells the BIOS where the bootloader is. A bootloader toolkit attacks this system by replacing a <br />machine's bootloader with a hacked version. <br />A bootloader rootkit infects the master boot record or volume boot record, which means it does <br />not show up in users' standard file systems. This makes it extremely difficult for the rootkit to <br />be detected by anti-rootkit and antivirus software. It may also modify boot records, which could <br />damage a machine when removed. <br />2 of 11 19/1717M't t• 1 R PM <br />