This is a trojan detection. Unlike viruses, trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.
Indication of Infection
There are no obvious symptoms of this exploit. Files detected as JS/Stealus are benign themselves. No system changes or damage occurs from accessing an JS/Stealus file. However, following an exploited hyperlink within a detected file can
result in users being tricked to divulge personal information, install malicious software, etc.
Methods of Infection
Email spam is the most likely delivery method of such malicious html pages, to lure users into updating account information.