A program or suite of programs (“kit”) intended to escalate privileges (“get root”) and/or maintain covert access and control of a system, i.e. without the knowledge of its owner.

Malware uses rootkit techniques for stealth purposes, that is, so as to be invisible on the infected machine to security programs using conventional detection methods.

Please enable Javascript to ensure correct displaying of this content and refresh this page.