Dark Mode

Settings

Capec-552 Detail

Install Rootkit

Detailed Software Likelihood: Medium Typical Severity: High

Parents: 542

Threats: T79 T284 T287 T337 T389 T391 T403 T406

Description

An adversary exploits a weakness in authentication to install malware that alters the functionality and information provide by targeted operating system API calls. Often referred to as rootkits, it is often used to hide the presence of programs, files, network connections, services, drivers, and other system components.

Not present

External ID Source Link Description
CAPEC-552 capec https://capec.mitre.org/data/definitions/552.html
CWE-284 cwe http://cwe.mitre.org/data/definitions/284.html
T1014 ATTACK https://attack.mitre.org/wiki/Technique/T1014 Rootkit
T1542.003 ATTACK https://attack.mitre.org/wiki/Technique/T1542/003 Pre-OS Boot:Bootkit
T1547.006 ATTACK https://attack.mitre.org/wiki/Technique/T1547/006 Boot or Logon Autostart Execution:Kernel Modules and Extensions

Not present

Not present

Not present

Not present

Not present

  1. A rootkit may take the form of a hypervisor. A hypervisor is a software layer that sits between the operating system and the processor. It presents a virtual running environment to the operating system. An example of a common hypervisor is Xen. Because a hypervisor operates at a level below the operating system it can hide its existence from the operating system.
  2. Similar to a rootkit, a bootkit is a malware variant that modifies the boot sectors of a hard drive, including the Master Boot Record (MBR) and Volume Boot Record (VBR). Adversaries may use bootkits to persist on systems at a layer below the operating system, which may make it difficult to perform full remediation unless an organization suspects one was used and can act accordingly.