Rootkit detections in South Africa up by 74%

Issue 4 2023 News & Events, Information Security

As reported by Kaspersky, the number of rootkit detections targeting businesses in South Africa grew by 74% in the first five months of 2023. In Kenya, the figure is 52% and in Nigeria 139%.

A rootkit is a malicious software or a collection of software programs used by cybercriminals to snoop into a computer or network and gain administrator-level control. One of the most common methods used by cybercriminals to install rootkits is to compromise the supply chain of a specific victim.

The uniqueness of a rootkit lies in its considerable amount of stealth, which cybercriminals aptly use to conceal their presence while carrying out their malicious activity and bypass security controls. Often, rootkit detections are difficult to investigate and analyse. It’s highly evasive design enables cybercriminals to steal personal data, access financial information, install malware, and use computers as part of a botnet to circulate spam or launch DDoS attacks. Rootkit malware can remain on a computer for a very long time, causing significant damage.

“APT groups are the trendsetters of the cyberthreat landscape. They consider ‘stealth’ to be key for successful exploitative tactics because you cannot protect yourself from something you cannot see. A rootkit perfectly fits the type of technique they would use. As reported previously, some of the APT groups had started leveraging rootkits in their activities. This trend caught the attention of other APT groups, cybercriminals and hacker communities, creating a domino effect and resulting in an increased use of rootkits,” said Abdessabour Arous, Security Researcher, Global Research and Analysis Team at Kaspersky.

“Since a rootkit can be installed on any hardware or software platforms, it is becoming far more dangerous as IoT and cloud technologies create a well-connected and integrated environment.”

To protect governments and organisations against a rootkit, Kaspersky researchers recommend:

• Restrict access and establish strict security protocols for the use of admin privileges.

• Use the latest version of operating systems that can mitigate rootkit deployment.

• Ensure all security features of your operating systems are activated.

• Update your Unified Extensible Firmware Interface (UEFI) firmware regularly. Use software from trusted vendors only.

• Ensure you use robust cybersecurity solutions that can eliminate risks from your IT supply chain as third-party attacks are gaining momentum.

• Leverage services like the Kaspersky Threat Intelligence to leverage real-time insights on cyberthreat tactics, techniques, tools and methods.

• Having an incident response process and security monitoring capabilities in place is also helpful.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
2025 Global OSPAs winners
News & Events
Bringing together the very best of the global security industry, the second Global Outstanding Security Performance Awards (OSPAs) was streamed live to a worldwide audience on 05 February 2026.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.

Read more...
A clear vision for a safer, smarter future
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.