A virus that hides itself in the boot sector so it remains undetected, making it difficult to disinfect. It has the ability to alter data to hide the virus by intercepting the boot sector.
Stealth Virus hides its presence by making an infected file not appear infected, but doesn't usually stand up to anti-virus software. Many stealth viruses intercept disk-access requests, so when an anti-virus application tries to read files or boot sectors to find the virus, the virus feeds the program a "clean" image of the requested item. Other viruses hide the actual size of an infected file and display the size of the file before infection.
Viruses that go to some length to conceal their presence from programs which might notice.
Stealth viruses have special protective mechanisms to escape being detected by anti-virus programs. To do so, they take over various system functions. Once this has been achieved, these viruses can no longer be detected during normal access to files and system areas. They fake the non-infected state of a file to deceive the anti-virus program. The stealth mechanisms of these viruses only become active, once the virus is resident in memory. Some viruses use partial stealth functions.
The ability to hide from detection and repair manifests in two ways. 1.Full - Virus redirects disk reads to avoid detection. 2.Size - Disk directory data is altered to hide the additional bytes of the virus.
a memory resident virus which hides by monitoring the system functions that read files or physical blocks, and make the results to be the original uninfected form of the file instead of the actual infected form
an atypically structured virus, that can induce multisystem illness, but that cunningly can do so without evoking an antiviral anti-inflammatory, immune response in the host (the normal immune response)
a resident virus that attempts to evade detection by concealing its presence in infected files
a type of cytopathogenic virus, which a virus that harms or destroys living cells
a virus that actively seeks to conceal itself from discovery or defends itself against attempts to analyze or removes itself
A virus that hides its presence from the computer user and anti-virus programs, usually by trapping interrupt services.
Stealth viruses attempt to conceal their presence from anti-virus software. Many stealth viruses intercept disk-access requests, so when an anti-virus application tries to read files or boot sectors to find the virus, the virus feeds the program a "clean" image of the requested item. Other viruses hide the actual size of an infected file and display the size of the file before infection. Stealth viruses must be running to exhibit their stealth qualities. Also: Interrupt Interceptors
These viruses actively hide themselves while running. The first common virus, the BRAIN (discovered in the wild in 1986), was a stealth virus. It infected the boot sector of a floppy diskette and any attempt to read the boot sector with BRAIN active would be redirected to a copy of the original boot sector someplace else on the diskette. See also File Stealth and Full Stealth.
A virus that actively seeks to conceal itself from discovery or defends itself against attempts to analyze or remove it.
A Stealth Virus is a virus that hides itself by intercepting disk access requests. When an antivirus program tries to read files or boot sectors to find the virus, the stealth virus feeds the antivirus program a clean image of file or boot sector.
The term stealth-adapted virus is used to describe cell damaging (cytopathic) viruses that lack genes coding for antigens targeted by the cellular immune system. Infection with stealth-adapted viruses do not evoke the inflammatory reaction typical of most cytopathic viruses. Stealth viruses may cause a range of neurological and psychiatric illnesses.
In computer science, a stealth virus is a file virus, that uses special techniques to hide its presence from users and virus scanners. This is achieved by intercepting the read request to the file and returning the content of the original read request to the uninfected file.