Dark Mode
Capec-552 Detail
Install Rootkit
Detailed Software Likelihood: Medium Typical Severity: High
Parents: 542
Threats: T79 T284 T287 T337 T389 T391 T403 T406
An adversary exploits a weakness in authentication to install malware that alters the functionality and information provide by targeted operating system API calls. Often referred to as rootkits, it is often used to hide the presence of programs, files, network connections, services, drivers, and other system components.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-552 | capec | https://capec.mitre.org/data/definitions/552.html | |
| CWE-284 | cwe | http://cwe.mitre.org/data/definitions/284.html | |
| T1014 | ATTACK | https://attack.mitre.org/wiki/Technique/T1014 | Rootkit |
| T1542.003 | ATTACK | https://attack.mitre.org/wiki/Technique/T1542/003 | Pre-OS Boot:Bootkit |
| T1547.006 | ATTACK | https://attack.mitre.org/wiki/Technique/T1547/006 | Boot or Logon Autostart Execution:Kernel Modules and Extensions |
Not present
Not present
Not present
Not present
Not present
- A rootkit may take the form of a hypervisor. A hypervisor is a software layer that sits between the operating system and the processor. It presents a virtual running environment to the operating system. An example of a common hypervisor is Xen. Because a hypervisor operates at a level below the operating system it can hide its existence from the operating system.
- Similar to a rootkit, a bootkit is a malware variant that modifies the boot sectors of a hard drive, including the Master Boot Record (MBR) and Volume Boot Record (VBR). Adversaries may use bootkits to persist on systems at a layer below the operating system, which may make it difficult to perform full remediation unless an organization suspects one was used and can act accordingly.