Understanding Drive-By Downloads: What They Are and How to Stay Safe
What is a drive-by download?
A drive-by download occurs when malicious software is downloaded to your computer without your knowledge or consent. Typically, downloading a file requires clicking on a link or explicitly approving the process. However, in a drive-by download, cybercriminals exploit vulnerabilities in your system to install malicious files secretly.
How do Drive-By Downloads Happen?
1. Compromised Websites
Visiting a malicious or compromised website using outdated or vulnerable software can trigger a drive-by download. These malicious sites are designed to scan your browser for weaknesses. If a flaw is detected, the malicious code exploits it to install harmful software on your system.
- Multiple Attack Vectors: Malicious web pages often contain various types of exploit code, increasing the likelihood that at least one will successfully compromise your device.
 
2. Phishing and Fake Websites
Cybercriminals frequently use phishing emails or fake text messages to trick you into visiting a harmful website. Simply opening the link can initiate the download process.
3. Malicious Advertisements
Even legitimate websites can host malicious advertisements, or “malvertising.” In these cases:
- Cybercriminals purchase ad space on trusted websites.
 - The ad includes hidden code designed to initiate a drive-by download.
 - Clicking the ad – or, in some cases, just viewing it – can compromise your computer.
 
How to protect yourself from Drive-By Downloads
Follow these best practices to reduce your risk:
1. Keep your software updates
You should regularly update your operating system, browser, and plugins. Software updates often include critical security patches that close vulnerabilities.
2. Exercise Caution with Ads and Emails
- Avoid clicking on suspicious ads, even on reputable websites.
 - Be wary of unexpected emails or messages with links, especially if they seem urgent or unusual.
 
3. Use Approved Browser Plugins
Only install browser plugins or extensions that are vetted and approved by trusted sources, such as your IT department or official app stores. Unapproved plugins may contain security flaws that expose your system to attacks.
Do you require support with your cybersecurity?
Chat to our team today!
✉️sales@theonepoint.co.uk
0333 247 6000
