A stealth virus is a computervirus that uses various mechanisms to avoid detection byantivirus software. It takes its name from the termstealth, which describes an approach to doing something while avoiding notice.
Typically, a stealth virus can hide in a computing device's legitimate files, partitions or boot sectors without alerting the antivirus software or notifying the user of its presence. Once injected into a computer, the virus enables the attackers to operate and gain control over parts of the system or the entire system.
A stealth virus is any virus that tries to avoid detection by antivirus software. However, viruses that escape notice, even if they're not specifically designed to do so, are also described as stealth viruses. This sometimes occurs because the virus is new or because users haven't updated their antivirus software to be able to detect the infection.
Stealth viruses aren't new. Brain, the first known virus to target IBM PCs, was a stealth virus that infected the boot sector of a floppy storage disk. Brain was created in Pakistan as an antipiracy measure in 1986.
A stealth virus has an intelligent architecture, making it hard to eliminate from a computer system. The virus is smart enough to rename itself and send copies to a different drive or location, evading detection by the system's antivirus software. The only way to remove it is to wipe the computer and rebuild it from scratch.
Booting a computer from a removable disk, such as aUSB drive, prevents the stealth virus from running amok before the antivirus orantimalware software scans for malware. Sophisticated, up-to-date antivirus software can reduce the risk of infection or eradicate a virus. Stealth viruses harm enterprises. Theaverage cost of a data breach from a stealth virus or other cyberattack is $4.4 million.
There are several types of stealth viruses. The most common are the following:
A stealth virus usually enters the system via infected web links, maliciousemail attachments and third-party application downloads. The virus tricks the system to get past an antivirus program using two primary methods:
Typically, when an antivirus program runs, a stealth virus hides in memory and uses various tricks to conceal any changes it has made to files or boot records. It can maintain a copy of the original, uninfected data and monitor system activity. When a program attempts to access altered data, the virus redirects it to a storage area that maintains the original data.
An antivirus program should scan the computer's memory and other commonly targeted areas to find stealth viruses. But this isn't always successful, because viruses can be designed to hide from antivirus software. They do this by concealing the size of the file they have infected, moving away from the infected file, copying themselves to a different drive and replacing themselves with a clean file.
When a stealth virus infects a computer system, it lets attackers control a variety of system tasks. The following are some of the issues associated with stealth virus attacks:
A stealth virus can use several different techniques to evade detection. The most common include the following:
The following are strategies to protect against a stealth virus:
Strong antivirus software. A comprehensive, up-to-date antivirus program recognizes and protects systems from stealth viruses and other malware, such asTrojans,worms,ransomware,spyware andadware. Modern antivirus programs use a virus signature strategy to detect and eliminate stealth virus threats. These signatures must be regularly updated to ensure the antivirus software can detect and eliminate new types of stealth viruses.
Stealth viruses have been active for several decades. The following are among the most famous:
Stealth viruses are one of the most dangerous modern cybersecurity threats. Explore thetop types of information security threats for IT teams.
FWA delivers wireless broadband internet to remote regions, temporary setups and other locations not suitable for wired ...
The internet would be different today without DNS anchoring digital communications. Companies can take some basic steps to ensure...
Cisco's entrée into 102.4 Tbps silicon boasts in-place programmability and new AgenticOps features as enterprise AI ...
The current AI hype era resembles the dot-com bubble era in some ways, but there are significant differences as well.
Rimini Street's CIO explains how he deployed agentic AI for research and service -- and how an AI steering committee governs ...
Agentic AI is forcing CIOs to rethink IT strategy. Success depends on identifying key use cases, assessing data readiness, ...
With Windows 10 end of support now past, enterprises must evaluate whether to upgrade to Windows 11 based on hardware readiness, ...
Risk is no longer centered only in core systems. Identity, hiring, endpoints and partner platforms are where exposure ...
The Windows 10 end-of-support deadline forces IT teams to choose between Windows 11 migration, ESU enrollment and broader desktop...
Q4 cloud infrastructure service revenues reach $119.1 billion, bringing the 2025 total to $419 billion. See how much market share...
Will $5 trillion in AI infrastructure investment be enough? Cloud providers facing that question must also yield a return, ...
As IT leaders aggressively re-allocate capital to fund new AI initiatives, repatriation offers both savings and greater control, ...
The ICO has won an important appeal relating to data protection obligations arising from a 2017-18 cyber attack at electronics ...
A newly-uncovered malware targeting the Android operating system seems to exploit Google’s Gemini GenAI tool to help it maintain ...
Survey from AI tech leader reveals growing advances of AI in telecoms, underscoring strong AI adoption, impact and investment in ...

