Attackers use rootkits to hide malware on a device in a way that allows it to persist undetected over time, sometimes for years. During that time, it can steal data or resources, or surveil communications. Operating system-based rootkits are scary enough, but firmware rootkits even more so. Both seek to persist, hide and evade from processes and procedures to eradicate them.
[ Get inside the mind of a hacker, learn their motives and their malware. | Sign up for CSO newsletters! ]
To read this article in full, please click here