CAPEC-CAPEC-552 - CERT CVE
Naziv

Install Rootkit

Sažetak An adversary exploits a weakness in authentication to install malware that alters the functionality and information provide by targeted operating system API calls. Often referred to as rootkits, it is often used to hide the presence of programs, files, network connections, services, drivers, and other system components.
Preduvjeti no
Rješenja Prevent adversary access to privileged accounts necessary to install rootkits.