Name Install Rootkit
Summary An adversary exploits a weakness in authentication to install malware that alters the functionality and information provide by targeted operating system API calls. Often referred to as rootkits, it is often used to hide the presence of programs, files, network connections, services, drivers, and other system components.
Prerequisites
Solutions Prevent adversary access to privileged accounts necessary to install rootkits.
Related Weaknesses
CWE ID Description
CWE-284 Improper Access Control
Back to Top