ITM Tech Cybersecurity Essentials Booklet - Flipbook - Page 10
THREATS
DRIVE-BY
ATTACK
Drive-by attacks use various online
resources to compromise a user’s
system. The malicious code can be
inserted in internet ads, HTTP or
PHP codes on websites, or even
applications. Contrary to other forms
of cyber attacks, a user doesn’t
have to do anything to initialise
the malicious software or virus. A
single click on a pop-up window or
website link can do the job!
Drive-by attacks are increasingly
used to spread viruses and malware.
The attacks take advantage of
security vulnerabilities in apps or
websites to exploit victim systems.
These include not updating the app,
flaws in security patches, bugs, and
more.
The attacks also run in the
background and are not visible
to the user. As a result, you can’t
take any concrete steps to identify
incorrect codes. Only being proactive
can help businesses protect
themselves from drive-by attacks.
ONE HALF
of all Cyber Attacks
Specifically Target
Small Businesses.
10
VICTIM
Visit Malicious Website
Re
d
Reverse Shell
to Attacker
ire
ct
Ex
p
WEB SERVER
(Compromised)
to
M
loi
alw
are
tB
row
ser
Se
rve
r
ATTACKER
MALWARE
SERVER
92 PERCENT
of Malware is Delivered by Email.