From: "FromTheRafters" <
[email protected]>
| Running as a limited rights user only makes it more difficult for
| malware to be sticky. Since the malware has the rights of the user,
| there is still much that it *can* do.
| There are no "end all" answers, only measures that can be taken to
| reduce impact.
| The "root" in rootkit is the *nix term for the higher privilege
account.
| The "kit" refers to a set of modified programs (tools and utilities)
| that a user with root privileges could use to replace the ones on
the
| target system (to hide nefarious activities from the victim). The
| attacker needed to have root privileges in order to implement the
kit.
| Now, both "root" and "kit" no longer apply to what is actually
happening
| in a user mode rootkit scenario. Granted, it is the Windows
equivalent
| of a similar purpose, to hide certain information (about nefarious
| activities) from the user.
A little something by Marco Giuliani of Prevx on the most prevalent
RootKit threat
http://www.prevx.com/blog/139/Tdss-rootkit-silently-owns-the-net.html