Technological power in the current world is not measurable by the number of people behind it, but for the number of systems behind it. Attackers do not depend on their own system power to attack their target. They rather build an army of victim hosts called zombies. So, who become zombies?
Bank accounts, credit card numbers, bill payments, Social Security Number (SSN), passwords, documents, etc. are some of the valuable data that home users store in their personal computers. Most home users do not patch their systems to prevent the latest vulnerabilities from being exploited. In fact, this does not apply only for latest vulnerabilities, but also for the ones that are couple of years old. This means that attackers could exploit the home-users by exploiting such un-patched vulnerabilities by using buffer-overflow, client-side exploits and so on. Once the attacker gains root/administrator access [which is the full system-access], they would install rootkits to the compromised hosts to get free multiple-entry lifetime access.
Gaining unlimited access to victim hosts would not only help the attackers to spy on them, but to also use these victims to build their zombie network to millions and then use it to their benefit. This means that rootkits not only provides backdoor access to the attackers, but also gives them the full control of their victims and worst of all, it misleads the victims from detecting the compromise.
While anti-rootkit tools are continuously researching and developing different ways to detect, prevent or eradicate rootkits, rootkit developers come up with different solutions to evade detection, auto-update their rootkits and also come up with rootkits that run on different layers where detection and prevention is almost impossible. This is the truth and nothing but truth, and this is not intended to scare the common people about the current situation. Rootkit development and defense is a never ending war between the bad and the good.
Home users spend money for anti-virus tools [OR] client-side firewalls, HIDS or HIPS [OR] some even have basic firewalls at home depending on who they are and what they do. Some do not have any of the above, since public awareness is not high enough for them to realize that these aren’t added layers of protection, but these are just the minimal requirements to protect themselves from the bad guys. Our intention here is to help home-users defend rootkits, for free.
NOTE: Our tools are listed in many sites and torrents, which makes it hard for us to track all downloads. Hence, we are listing only the total installations from our website.