Viruses

MITRE ATTACK layer: Execution

A computer virus is malicious code that attaches itself to legitimate files or programs and spreads when those files are executed. Unlike modern malware families, viruses rely on user action and file execution. In modern attacks, viruses often act as delivery mechanisms, not the final weapon. They can lie dormant until activated.

How is Viruses abused

Attackers embed viruses into documents, installers, scripts, or shared binaries, often disguising them as normal business files. Once executed, the virus spreads to other files or network shares, sometimes adding spyware, backdoors, or destructive payloads.

Why Viruses matters

Viruses exploit trust and routine behavior like opening files, sharing documents, using USB drives. Viruses can still spread without internet accessn, even in legacy systems, OT environments and air-gapped networks, making them hard to contain and expensive to eradicate.

Real-world example

"Shai-Hulud" outbreak

Today’s viruses rarely look like ILOVEYOU or Mydoom anymore. Modern virus tends to be modular like trojans, loaders or ransomware. In late 2025, a virus-style self-replicating malware called Shai-Hulud spread through 700+ npm JavaScript packages, infecting hundreds of packages and more than 25,000 GitHub repositories. Since it already had over 100 million downloads, teams had to freeze deployments, disable package publishing, or shut down their networks.

Source

Get the full attack repository

Get our entire attack repository in a single, offline-ready PDF guide, featuring 25+ real-world attacks.

Please enter a valid email.Please enter a email.
By clicking 'Download EBOOK', you agree to processing of personal data according to the Privacy Policy.

Additional Resources

Achieve 442% ROI and reduce patching time by 95% — Forrester TEI Report

See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central.

Read more
Experience enterprise-grade protection proven in real-world tests — AV-Comparatives Report

Discover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months.

Read more
Simplify endpoint security and build cyber resilience — Endpoint Security For Dummies

Get a clear, practical guide to understanding threats and strengthening your organization’s security.

Read more

Trusted by