Bob discovers a piece of malicious software deeply embedded…
Bob discovers a piece of malicious software deeply embedded within a computer’s operating system that allows an attacker to gain and maintain unauthorized administrator-level access while actively hiding its presence. Alice explains that this type of malware can disable security software, intercept system calls, and maintain control of the compromised device without being detected—what kind of malware is this?