A class of malware that secretly operates in an infected system and deploys special tools to evade detection by security systems.

Such malware is divided into user- and kernel-level rootkits. The former have the same rights as most applications, the latter have full access rights to all operating system components.

Rootkits can be used to steal personal and banking data, form part of a botnet, or be employed as a backdoor for remote device control.