A computer virus is malicious code that attaches itself to legitimate files or programs and spreads when those files are executed. Unlike modern malware families, viruses rely on user action and file execution. In modern attacks, viruses often act as delivery mechanisms, not the final weapon. They can lie dormant until activated.
Attackers embed viruses into documents, installers, scripts, or shared binaries, often disguising them as normal business files. Once executed, the virus spreads to other files or network shares, sometimes adding spyware, backdoors, or destructive payloads.
Viruses exploit trust and routine behavior like opening files, sharing documents, using USB drives. Viruses can still spread without internet accessn, even in legacy systems, OT environments and air-gapped networks, making them hard to contain and expensive to eradicate.
Today’s viruses rarely look like ILOVEYOU or Mydoom anymore. Modern virus tends to be modular like trojans, loaders or ransomware. In late 2025, a virus-style self-replicating malware called Shai-Hulud spread through 700+ npm JavaScript packages, infecting hundreds of packages and more than 25,000 GitHub repositories. Since it already had over 100 million downloads, teams had to freeze deployments, disable package publishing, or shut down their networks.
SourceGet our entire attack repository in a single, offline-ready PDF guide, featuring 25+ real-world attacks.
See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central.
Read moreDiscover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months.
Read moreGet a clear, practical guide to understanding threats and strengthening your organization’s security.
Read more