Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Definition

What are Stealth viruses?

June 12, 2023
Reading Time: 2 mins read
in Definition

Stealth viruses are a type of computer virus that actively attempts to hide its presence and activities on an infected system. Unlike other viruses that may display visible symptoms or trigger noticeable effects, stealth viruses employ various techniques to avoid detection by antivirus software and other security measures.

These techniques include modifying their own code or the code of infected files to evade detection, intercepting and altering system calls to conceal their actions, and manipulating file timestamps to avoid suspicion.

Stealth viruses often reside in the computer’s memory, making them difficult to detect and remove. Their primary goal is to remain undetected while continuing to infect and compromise the system.

Stealth viruses additional characteristics:

  1. Polymorphic Nature: Stealth viruses often possess polymorphic capabilities, meaning they can change their code structure or appearance each time they infect a new file or system. This makes it challenging for traditional signature-based antivirus software to identify and block them.

  2. Rootkit Functionality: Some stealth viruses incorporate rootkit techniques to gain deep-level access and control over the infected system. By exploiting vulnerabilities in the operating system, they can manipulate system functions, hide their presence from detection tools, and maintain persistence even after system reboots.

  3. Anti-Antivirus Measures: Stealth viruses employ anti-antivirus techniques to hinder detection by security software. These measures may involve disabling or evading real-time scanning, terminating or corrupting antivirus processes, or modifying the antivirus program’s files or registry entries to render it ineffective.

  4. File and Boot Sector Infection: Stealth viruses commonly infect executable files and the boot sector of storage devices. By infecting the boot sector, they ensure their activation during the system startup process, enabling them to load before the operating system and antivirus software.

  5. Stealthy Payload Execution: Stealth viruses often execute their malicious payload discreetly, taking precautions to avoid raising suspicion or triggering alarms. They may employ techniques such as code obfuscation, encryption, or executing malicious code in small, dispersed fragments to evade detection.

  6. Data Corruption: Some stealth viruses intentionally corrupt data on infected systems, causing errors or rendering files unusable. This tactic serves to distract users and administrators from suspecting the presence of a virus and to create a sense of urgency in resolving the apparent issues.

  7. Network Propagation: Stealth viruses can exploit network vulnerabilities and spread to other connected systems, making them capable of infecting multiple machines within a network environment. They may use various propagation methods, such as exploiting unpatched software, leveraging shared drives or resources, or using social engineering techniques to trick users into executing infected files.

Tags: Cyber DefinitionCyber Professionals DefinitionsDefinitionsMalicious softwareMalwaremalware-definitionsMobile Device SecurityStealth virusesvirus
ADVERTISEMENT

Related Posts

Vulnerability Analysis Definition

Vulnerability Analysis Definition

November 14, 2023
What’s a Fileless Malware?

What’s a Fileless Malware?

June 28, 2023
What’s a Web Skimmer? (Malware)

What’s a Web Skimmer? (Malware)

June 27, 2023
What’s a Virus? (Malware)

What’s a Virus? (Malware)

June 18, 2023
What’s an Antivirus Software?

What’s an Antivirus Software?

June 18, 2023

What’s a DeepLocker Malware?

June 16, 2023

Latest Alerts

Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

APT28 RoundPress Webmail Hack Steals Emails

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Subscribe to our newsletter

    Latest Incidents

    Hackers Target Swiss Reserve Power Plant

    Coinbase Insider Attack Exposed User Data

    Cyberattack Hits J Batista Group

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial