{"id":23188,"date":"2020-12-09T09:59:52","date_gmt":"2020-12-09T01:59:52","guid":{"rendered":"https:\/\/web.mwwsb.com.my\/pjci\/?post_type=kb&p=23188"},"modified":"2022-09-08T20:00:20","modified_gmt":"2022-09-08T12:00:20","slug":"security-tips-rootkit-trojan","status":"publish","type":"kb","link":"https:\/\/www.casbay.com\/guide\/kb\/security-tips-rootkit-trojan","title":{"rendered":"SECURITY TIPS: RootKit Trojan"},"content":{"rendered":"\t\t
Tips RootKit Trojan \u2013 Scanning & Prevention<\/p>
Dear valued customers,<\/p>
Our security team has reported that some of the VPS <\/a>and dedicated servers <\/a>have been infected with Trojan RootKit<\/em><\/strong>. Scanner Tools for RootKit Trojan<\/strong> If you need\u00a0any further assistance, please contact us again.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t In case if you are wondering,<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t A rootkit is an application\/ set of applications that conceals its presence, or the presence of another application, like adware or spyware, on a device. Rootkits hide by using some of the lower layers of the operating system, including API function redirection or undocumented OS functions. This makes us almost unable to detect them by using common anti-malware software.<\/p><\/div> Have you ever wondered- where does the term \u201crootkit\u201d comes from? In Unix and Linux operating systems (OS), the system admin, there is an all-powerful account with full privileges and access with no restrictions (similar to the administrator account in Windows). We call the account- \u201croot\u201d<\/strong>. Moreover, the applications that allow unauthorized root\/admin-level access to the device and restricted areas, we refer them as- \u201ckit\u201d<\/strong>.<\/p> So, put the two together, you will get \u201crootkit<\/strong>\u201d. In other words, a rootkit is a program<\/strong> that lets someone with legitimate or malicious intent privilege access<\/strong> a computer <\/strong>or mobile device<\/strong>. Through this, the person can now control the device remotely without the owner\u2019s knowledge or consent.<\/p>
We would therefore like to take this chance to inform all of our owners of dedicated & VPS servers to be vigilant and try not to let Trojan RootKit in their servers.<\/p>
a)\u00a0rkHunter<\/strong>\u00a0\u2013 rootkit scanner,\u00a0<\/em>
b)\u00a0chkrootkit<\/strong>\u00a0\u2013 another rootkit scanner,\u00a0<\/em>
c)\u00a0clamav<\/strong>\u00a0\u2013 anti-virus scanner,\u00a0<\/em>
#\u00a0rpm based installer<\/strong>,
<\/em><\/p>What is a Rootkit?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t