
August 18, 2025
What to look for in a business email service (and why it matters)
Key features to help you stay organized, write better emails, and keep your data secure.
Learn moreThe first step to staying safe online is knowing what types of cyber threats pose a risk to your devices and accounts. By understanding what a rootkit is and how it operates, you’ll avoid losing your personal information.
Originally derived from the Unix and Linux operating systems, the word “root” referred to the administrative account on the system, while “kit” described the software that implements the tool. A rootkit now refers to a type of malicious software that gives continuous access to your device while remaining undetected. Rootkits open a door for other malware, like viruses and keyloggers, to infect your system.
Unlike many other types of malware, rootkits conceal their presence even while active, making them difficult to detect. Cybercriminals use rootkits to steal personal or financial information, install malware, and use your device to disperse spam.
Stay safer online with one easy-to-use app1
1Microsoft 365 Personal or Family subscription required; app available as separate download
Similar to other types of malware, rootkits infect your computer system through various tactics, including email phishing, corrupted files, or downloaded software from unsafe websites. Once installed on a device, cybercriminals use rootkits to control the device without its owner noticing. Additional malware can be installed, like keylogging software to track what you type and steal your username and passwords.
A rootkit allows someone to maintain command and control over a computer without the computer user/owner knowing about it. Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine. A rootkit on an infected computer can also access log files and spy on the legitimate computer owner’s usage.
Rootkits disguise their presence, even while active, making them difficult to detect and remove. Although there aren’t any security products that can find and delete all rootkits, there are ways to look for one on an infected device.
Because rootkits can be difficult to find and remove, preventing them from infecting your device is the best way to avoid security issues. General cyber hygiene best practices help prevent many types of malware, including rootkits.
Like other types of malware, a rootkit causes serious damage by allowing cybercriminals to access your personal information and control your device. Taking note of unusual behavior on your device and maintaining good cyber hygiene will help protect you from becoming a victim of a security breach.
The powerful productivity apps and creativity tools in Microsoft 365 just got better. Work, play, and create better than ever before with the apps you love and Microsoft Copilot by your side.
Try for free