https://www.techtarget.com/searchsecurity/definition/stealth-virus
A stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software. It takes its name from the term stealth, which describes an approach to doing something while avoiding notice.
Typically, a stealth virus can hide in a computing device's legitimate files, partitions or boot sectors without alerting the antivirus software or notifying the user of its presence. Once injected into a computer, the virus enables the attackers to operate and gain control over parts of the system or the entire system.
A stealth virus is any virus that tries to avoid detection by antivirus software. However, viruses that escape notice, even if they're not specifically designed to do so, are also described as stealth viruses. This sometimes occurs because the virus is new or because users haven't updated their antivirus software to be able to detect the infection.
Stealth viruses aren't new. Brain, the first known virus to target IBM PCs, was a stealth virus that infected the boot sector of a floppy storage disk. Brain was created in Pakistan as an antipiracy measure in 1986.
A stealth virus has an intelligent architecture, making it hard to eliminate from a computer system. The virus is smart enough to rename itself and send copies to a different drive or location, evading detection by the system's antivirus software. The only way to remove it is to wipe the computer and rebuild it from scratch.
Booting a computer from a removable disk, such as a USB drive, prevents the stealth virus from running amok before the antivirus or antimalware software scans for malware. Sophisticated, up-to-date antivirus software can reduce the risk of infection or eradicate a virus. Stealth viruses harm enterprises. The average cost of a data breach from a stealth virus or other cyberattack is $4.4 million.
There are several types of stealth viruses. The most common are the following:
A stealth virus usually enters the system via infected web links, malicious email attachments and third-party application downloads. The virus tricks the system to get past an antivirus program using two primary methods:
Typically, when an antivirus program runs, a stealth virus hides in memory and uses various tricks to conceal any changes it has made to files or boot records. It can maintain a copy of the original, uninfected data and monitor system activity. When a program attempts to access altered data, the virus redirects it to a storage area that maintains the original data.
An antivirus program should scan the computer's memory and other commonly targeted areas to find stealth viruses. But this isn't always successful, because viruses can be designed to hide from antivirus software. They do this by concealing the size of the file they have infected, moving away from the infected file, copying themselves to a different drive and replacing themselves with a clean file.
When a stealth virus infects a computer system, it lets attackers control a variety of system tasks. The following are some of the issues associated with stealth virus attacks:
A stealth virus can use several different techniques to evade detection. The most common include the following:
The following are strategies to protect against a stealth virus:
Strong antivirus software. A comprehensive, up-to-date antivirus program recognizes and protects systems from stealth viruses and other malware, such as Trojans, worms, ransomware, spyware and adware. Modern antivirus programs use a virus signature strategy to detect and eliminate stealth virus threats. These signatures must be regularly updated to ensure the antivirus software can detect and eliminate new types of stealth viruses.
Stealth viruses have been active for several decades. The following are among the most famous:
Stealth viruses are one of the most dangerous modern cybersecurity threats. Explore the top types of information security threats for IT teams.
12 Sep 2025