The “Hikit” rootkit: advanced and persistent attack techniques (part 2)