Open In App

What is a Drive By Download Attack?

Drive by download assaults are precisely defined as malicious software installations on your devices that happen without your knowledge. This also applies to the unintentional downloading of any files or software bundles onto a computer system.

What is Drive By Download? 

A drive-by download is a cyber-attack that unintentionally downloads malicious code onto a computer or mobile device that exposes the users to different threats and could be used to conduct one or more of the following things:



The user doesn’t have to click on anything, press download, or open a malicious email attachment to become infected. These types of attacks can take advantage of an app, operating system, or web browser that contains security flaws due to a lack of updates or unsuccessful updates. 

How does Drive By Download Attack Work?

There are two main ways malicious drive by downloads get into the device:



1. Authorized Downloads Without Knowing Full Implications

Authorized attacks happen when a website or software seller offers a trustworthy program or application that is downloaded automatically when a user visits the website or uses the product. Typically, the user is alerted about the download and may be prompted to approve the installation.

Authorized drive-by downloads are designed to be efficient and can often be detected before an attack occurs. The process is as follows:

2. Unauthorized Downloads Without Any Notification 

Unauthorized downloads (without any notification): Attacks described as unauthorized drive-by downloads happen when hackers penetrate a website and insert harmful code into its HTML or JavaScript files. The user may not even be aware that something was downloaded onto their machine if the site has been compromised in their absence. An unauthorized drive by download operates in several stages, despite its apparent simplicity, the process is as follows:

Examples of Drive By Download Attacks

1. Attack Using a Java Zero-Day Vulnerability

In 2013, hackers infected several trustworthy websites with malware using a Java Zero-Day Vulnerability. Anyone who had a vulnerable version of Java installed on their machine who accessed these sites was instantaneously infected.

2. Malvertising Campaign

In 2016, a new malicious campaign targeted users of well-known news and entertainment websites. The attackers utilized malicious advertising to lure consumers to websites where malware was downloaded onto their devices. User data was intended to be stolen by the malware and sent back to the attackers.

3. Phishing Email Campaign

In 2015, a large U.S. bank’s clients were the subject of a phishing email campaign. The emails included a link to a fake login page that mimicked the bank’s legitimate login page identically. The attackers carried out a drive-by download attack to infect users’ devices with malware as soon as they input their login information.

4. Attack Using Typo-Squatting

In 2019, attackers registered a domain name that was identical to one letter of the name of a well-known gaming website. Anybody who unintentionally typed the incorrect letter in the website’s URL was forwarded to the bogus site, where malware was put onto their devices.
 

Types of Drive By Download Attack 

There are several types of drive-by-download attacks, including:

Types of Drive By Download Payloads

Attackers can use drive-by downloads to deploy a variety of vicious software to a user’s device. These can include:

How to Avoid Drive-by Download Attacks?

The following are some measures to protect yourself from the risks associated with drive-by download attacks: –

How Website Owners Can Prevent Drive by Downloads?

As a website owner, you’re considered to be the primary security line between a hacker and your website audience, to ensure the best security of your user’s peace of mind, you have to build up your infrastructure with these tips:

Tips for Endpoint Users

 End Users can follow these pro tips to protect themselves and their software against a drive-by download attack: –


Article Tags :