top of page

What is a Drive-By-Download?

  • Writer: Rolando Ramos
    Rolando Ramos
  • 4 days ago
  • 2 min read

Threat Type: Drive-By-Download


Threat Category: Malware-Based Threat


Cyber Threat Indicators


Drive-by-Download is a method of infecting a computer with malicious software (malware) simply by visiting a compromised or malicious website. 


A drive-by download is an attack that leverages vulnerabilities in a user's web browser, operating system, or installed applications (like Flash, Java, or an outdated PDF viewer) to silently install malware.


It's called "drive-by" because the infection occurs just by "driving past" the compromised site, similar to how a person could be infected with a virus just by walking through a contaminated area.


Core Characteristics


Drive-by downloads are defined by a few key technical and user-experience characteristics:


Absence of User Consent: The most defining characteristic is the lack of any required user action to initiate the download and installation of the malware, beyond the initial page visit. The user doesn't see a file download prompt.


Exploitation of Software Vulnerabilities: The attack relies on an exploit kit to identify and take advantage of security flaws (vulnerabilities) in the user's software stack, usually in older, unpatched versions.


Hidden Execution: The malicious code is often loaded from a third-party server (not the site the user intended to visit) through hidden elements like invisible iframes or injected scripts.


Triage and Payload: The malicious code first performs a "triage" on the victim's computer to check the version numbers of installed software. Once a vulnerability is found, the exploit is delivered, which then executes the final payload (the actual malware, such as ransomware or a banking trojan).


Common Examples and Tactics


Attackers use several sophisticated tactics to execute drive-by downloads:

Tactic

Description

Malvertising

The attacker buys ad space on legitimate, high-traffic websites (like major news sites). The ad itself contains the malicious code or redirects the user's browser to an exploit kit without the user or the website owner knowing.

Compromised Legitimate Websites

Attackers break into a reputable, popular website and inject a small piece of malicious code (often JavaScript). When a regular user visits the site, the injected script loads the exploit kit.

Exploit Kits (EKs)

These are automated toolsets that cybercriminals use. They host a collection of different exploits. When a potential victim's browser lands on the EK's page, the kit runs through its library of exploits until it finds one that works against the user's outdated software.

Zero-Pixel Iframes

An attacker embeds an invisible HTML iframe (an element that loads another web page inside the current one) with a size of $0 \times 0$ pixels. This iframe silently loads the malicious website hosting the exploit kit.

---


VIIEGO the human security agency for human security research and consulting in identity manipulation and fraud prevention to decode human behavior and secure your identity.


www.viiego.com | Protect What's Yours.

How Can We Help?

VIIEGO

bottom of page