HomeGlossaryDrive-by Download Attack

Drive-by Download Attack

MITRE ATTACK layer: Initial Access

A drive-by download is a stealthy cyberattack where malicious software silently installs on a device without the user's knowledge or consent, triggered simply by visiting a compromised website or viewing an infected advertisement.

How is Drive-by Download Attack abused

Attackers exploit unpatched vulnerabilities in web browsers, plugins, or operating systems by injecting malicious scripts into legitimate websites or hidden advertisements, triggering automatic malware downloads the moment a page loads.

Why Drive-by Download Attack matters

Drive-by downloads silently compromise systems, installing ransomware, trojans, spyware, or credential stealers that enable data theft, system hijacking, prolonged unauthorized access, or recruitment of infected devices into criminal botnets.

Real-world example

DARKCRYSTALRAT

In early 2025, the APT44 threat group weaponized software installers and compromised web portals to distribute DARKCRYSTALRAT malware through opportunistic drive-by downloads, silently infecting systems during routine browsing sessions.

Source

Get the full attack repository

Get our entire attack repository in a single, offline-ready PDF guide, featuring 25+ real-world attacks.

Please enter a valid email.Please enter a email.
By clicking 'Download EBOOK', you agree to processing of personal data according to the Privacy Policy.

Additional Resources

Achieve 442% ROI and reduce patching time by 95% — Forrester TEI Report

See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central.

Read more
Experience enterprise-grade protection proven in real-world tests — AV-Comparatives Report

Discover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months.

Read more
Simplify endpoint security and build cyber resilience — Endpoint Security For Dummies

Get a clear, practical guide to understanding threats and strengthening your organization’s security.

Read more

Trusted by