Detecting and Removing Rootkits:
- Run and scan the system using professional security tools that detect rootkits.
- Check all of the user accounts on the system to ensure they are legitimate.
- Elevate the security level for all of the accounts if possible.
- Update all of the software programs the system is running from known legit sources.
- Change all of the passwords that are being used routinely.
- Eliminate or disable any accounts that you did not create or are not using anymore.
- Change the network settings so that the system is difficult to access externally.
- Bring in an IT expert to further inspect and remove the rootkit, if needed.