# Drive-by Download Attack **MITRE ATTACK layer:** Initial Access A drive-by download is a stealthy cyberattack where malicious software silently installs on a device without the user's knowledge or consent, triggered simply by visiting a compromised website or viewing an infected advertisement. ## How is Drive-by Download Attack abused Attackers exploit unpatched vulnerabilities in web browsers, plugins, or operating systems by injecting malicious scripts into legitimate websites or hidden advertisements, triggering automatic malware downloads the moment a page loads. ## Why Drive-by Download Attack matters Drive-by downloads silently compromise systems, installing ransomware, trojans, spyware, or credential stealers that enable data theft, system hijacking, prolonged unauthorized access, or recruitment of infected devices into criminal botnets. ## Real-world example ### DARKCRYSTALRAT In early 2025, the APT44 threat group weaponized software installers and compromised web portals to distribute DARKCRYSTALRAT malware through opportunistic drive-by downloads, silently infecting systems during routine browsing sessions. [Source](https://services.google.com/fh/files/misc/m-trends-2025-en.pdf) ## Related topics ### Malware [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/malware.html) ### Zero-Day Exploit [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/zero-day-exploit.html) ### Cross-Site Scripting [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/cross-site-scripting.html) ## Additional Resources ### Research **Achieve 442% ROI and reduce patching time by 95% — Forrester TEI Report** See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central. [Read more](https://www.manageengine.com/products/desktop-central/forrester-total-economic-impact-uems.html?utm_source=ec-attackglossary) ### Security validation **Experience enterprise-grade protection proven in real-world tests — AV-Comparatives Report** Discover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months. [Read more](https://www.manageengine.com/products/desktop-central/malware-protection-av-comparatives-dec2025.html?utm_source=ec-attack_glossary) ### Guide **Simplify endpoint security and build cyber resilience — Endpoint Security For Dummies** Get a clear, practical guide to understanding threats and strengthening your organization’s security. [Read more](https://www.manageengine.com/products/desktop-central/endpoint-security-for-dummies.html?utm_source=ec_attack-glossary)