What are Drive-by downloads? Prevent Drive-by download attacks!

What are Drive-by downloads? Drive-by download attacks occur when vulnerable computers get infected by just visiting a website. Findings from latest Microsoft Security Intelligence Report and many of its previous volumes reveal that Drive-by Exploits have become the top web security threat to worry about. Even the EU cyber security group, the European Network and Information Security Agency (ENISA) agrees.

Drive-by downloads

It’s accepted that Drive-by download attacks continue to be many attackers’ favorite type of attack. This is because the attack can be easily launched through injection of a malicious code to legitimate websites. Once injected, malicious code may exploit vulnerabilities in operating systems, web browsers and web browser plugins such as Java, Adobe Reader and Adobe Flash. The initial code that gets downloaded is usually small. But once it lands on your computer, it will contact another computer and pull the rest of the malicious coder to your system.

In short, vulnerable computers can be infected with malware simply by visiting such a website, without attempting to download anything. Such downloads happen without the person’s knowledge. These are called Drive-by downloads.

New data and findings has high-lighted the relative prevalence of drive-by download sites, hosted different web server platforms.

Certain representations made in the article via figures gives a fair idea of the concentration of drive-by download pages in countries and regions throughout the world at the end of first and second quarters of 2013, respectively. Locations with relatively high concentrations of drive-by download URLs in both quarters include,

  1. Syria – 9.5 drive-by URLs for every 1,000 URLs
  2. Latvia – 6.6
  3. Belarus – 5.6.

First Quarter of 2013

Drive-by downloads

Second quarters of 2013

threat attack 2

The Drive-by Download concentrations were tracked by Bing at the end of the second quarter of 2013. Accordingly, the measures taken by the search engine to help protect users from drive-by download attacks include analysis of websites for exploits when indexing them and displaying warning messages when listings for drive-by download pages appear in the list of search results.

Bing engine

Prevent Drive-by download attacks

This TechNet article features steps for developers and IT Professionals to be taken for managing the risk related to drive-by download attacks. Some of the measures include:

Preventing web servers from being compromised. Web servers can be compromised if they are not kept updated with the latest security updates. So,

  1. Keep the server’s operating system(s) up to date
  2. Software installed on these web servers up to date
  3. Check out SDL Quick Security Reference Guides for latest updates
  4. Avoid browsing the Internet from web servers or using them to open email and email attachments.
  5. Register your site with Bing webmaster tools and Google Webmaster, so that search engines can proactively inform you if they detects something bad on your site.

As a user, you can take the following precautions:

  1. Make sure your Windows operating system and web browser is fully up-to-date.
  2. Use a good security software and again ensure that it has the latest definitions always
  3. Use minimum browser addons as they often get compromised
  4. Using a URL Scanner addons for your browser might also be an option you may want to consider
  5. If you are using Internet Explorer make sure your SmartScreen is turned on.
  6. And finally, develop a habit of safe browsing and be selective about which sites you browse regularly.

Do let us know if your computer has ever been infected with a drive-by download attack.

Now read: What is Malvertising?

Posted by on , in Category Security with Tags
Anand Khanse is the Admin of TheWindowsClub.com and a 10-year Microsoft MVP Awardee in Windows for the period 2006-16. Please read the entire post & the comments first, create a System Restore Point before making any changes to your system & be careful about any 3rd-party offers while installing freeware.