rootkit
Rootkits use file obfuscation techniques to allow spyware and other malicious software to avoid detection and removal. Rootkits typically hide logins, processes, files and logs, and may include software to capture information from desktops or a network. A rootkitâs abilities to hide the presence of an intruder and the intruder's actions explain the increase in use of this method.