{"id":1578,"date":"2014-05-16T15:48:00","date_gmt":"2014-05-16T18:48:00","guid":{"rendered":"https:\/\/www.psafe.com\/blog\/que-es-el-virus-stealth"},"modified":"2014-06-05T16:04:29","modified_gmt":"2014-06-05T19:04:29","slug":"que-es-el-virus-stealth","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/es\/blog\/que-es-el-virus-stealth\/","title":{"rendered":"\u00bfQu\u00e9 es el virus Stealth?"},"content":{"rendered":"<p>Es un conjunto de malwares que utilizan t&eacute;cnicas de programaci&oacute;n para evitar su detecci&oacute;n por herramientas de seguridad. Ejemplos de mecanismos para lograr ese ocultamiento son los virus Polim&oacute;rficos y Metam&oacute;rficos, que crean mutaciones de s&iacute; mismos despu&eacute;s de la ejecuci&oacute;n. La mayor&iacute;a de los malwares, no obstante, utilizan s&oacute;lo m&eacute;todos de criptograf&iacute;a, mezclando los c&oacute;digos para que el antivirus no los reconozca como maliciosos.<\/p>\n<p>Tambi&eacute;n, intentan eliminar las tareas asociadas al software antivirus antes que sean detectados. Proceden del sistema operacional DOS.<\/p>\n<h2><img decoding=\"async\" alt=\"\" src=\"http:\/\/static.psafe.net\/blog\/virus-stealth_2014-05-16.jpg\" style=\"height:200px; width:200px\" \/><\/h2>\n<h2>Ejemplos de virus Stealth<\/h2>\n<p>-Natas: de 1994, podr&iacute;a subscribir partes del disco r&iacute;gido o &nbsp;del boot despu&eacute;s de ser activado.<\/p>\n<p>&#8211; Brain: de 1986, volviendo a comprometer el sistema operacional DOS.&nbsp;<\/p>\n<p>Lee nuestro <a href=\"https:\/\/www.psafe.com\/es\/blog\/diccionario-virus\/\">diccionario de virus<\/a> completo<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conjunto de malwares que utilizan t\u00e9cnicas de programaci\u00f3n para evitar su detecci\u00f3n por herramientas de seguridad.<\/p>\n","protected":false},"author":18,"featured_media":8534,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-1578","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/es\/blog\/wp-json\/wp\/v2\/posts\/1578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/es\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/es\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/es\/blog\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/es\/blog\/wp-json\/wp\/v2\/comments?post=1578"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/es\/blog\/wp-json\/wp\/v2\/posts\/1578\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/es\/blog\/wp-json\/wp\/v2\/media\/8534"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/es\/blog\/wp-json\/wp\/v2\/media?parent=1578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/es\/blog\/wp-json\/wp\/v2\/categories?post=1578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/es\/blog\/wp-json\/wp\/v2\/tags?post=1578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}