• Barbarian@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    8
    ·
    edit-2
    6 months ago

    I’m sorry to disappoint, but with rootkits, that is very real. With that level of permissions, it can rewrite HDD/SSD drivers to install malware on boot.

    There’s even malware that can rewrite BIOS/UEFI, in which case the whole motherboard has to go in the bin. That’s much less likely due to the complexity though, but it does exist.

    • JimboDHimbo@lemmy.ca
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      2
      ·
      6 months ago

      not all rootkits are made to do that. So yes in some cases, throw it in the trash. In others, remediate your machine and move on.

      • Barbarian@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        7
        ·
        6 months ago

        Outside of monitoring individual packets outside of your computer (as in, man in the middle yourself with a spare computer and hoping the malware phones home right when you’re looking) there’s no way of knowing.

        Once ring 0 is compromised, nothing your computer says can be trusted. A compromised OS can lie to anti-malware scanners, hide things from the installed software list and process manager, and just generally not show you what it doesnt want to show you. “Just remediate” does not work with rootkits.

        • JimboDHimbo@lemmy.ca
          link
          fedilink
          English
          arrow-up
          4
          ·
          6 months ago

          Dude… That’s fucked. They should really go a little more in depth on rootkits in the CompTIA A+ study material. I mean, I get that it’s supposed to be a foundational over view of most IT concepts, but it would have helped me not look dumb.