The name “rootkit” came from the days when Unix dominated the computer landscape. “Root” in Unix and Linux is the ultimate administrator of the operating system, a superuser. Root users have full access to the operating system and can make any change at will—hence the name for tools that let attackers operate covertly with root-level rights. Today, rootkits typically target Microsoft Windows operating systems. Other operating systems are targeted, too—and none are immune.
In theory, a rootkit enables undetectable access to a computer system. Rootkits typically have payloads consisting of keyloggers, backdoors, and other nefarious programs designed to steal data, intercept network communications, or use computer resources in a botnet/zombie network.
Rootkits are more persistent and harder to track down than Trojans, worms, and logic bombs. These other types of malware hide by naming files they create with a familiar name to appear innocuous to the user. But rootkits operate stealthily by hiding the processes, by removing the processes from the process viewer or burying their code in existing dynamic link libraries (DLL), or by replacing existing binaries with a binary provided by the rootkit.