{"componentChunkName":"component---src-templates-dictionary-term-tsx","path":"/dictionary/drive-by-downloads","result":{"data":{"contentfulDictionaryTerm":{"title":"Drive-by downloads","slug":"drive-by-downloads","descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":"What are drive-by downloads, and how can you protect yourself from them? Find out everything you need to know in this article."}},"body":{"body":"# Drive-by downloads\nThese occur without the knowledge of a user. A user must simply visit an infected website to trigger the malware download. Hackers continuously attack legitimate websites to inject malicious code. Then, when a user browses that legitimate website (not knowing that it was compromised), the injected code is loaded by their browser automatically, resulting in infection.","childMarkdownRemark":{"htmlAst":{"type":"root","children":[{"type":"element","tagName":"h1","properties":{"id":"drive-by-downloads","style":"position:relative;"},"children":[{"type":"text","value":"Drive-by downloads"},{"type":"element","tagName":"a","properties":{"href":"#drive-by-downloads","ariaLabel":"drive by downloads permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"These occur without the knowledge of a user. A user must simply visit an infected website to trigger the malware download. Hackers continuously attack legitimate websites to inject malicious code. Then, when a user browses that legitimate website (not knowing that it was compromised), the injected code is loaded by their browser automatically, resulting in infection."}]}],"data":{"quirksMode":false}}}}}},"pageContext":{"title":"Drive-by downloads","slug":"drive-by-downloads","keepLearning":[{"title":"Easter Egg","slug":"easter-egg"},{"title":"Encryption","slug":"encryption"},{"title":"Exploit","slug":"exploit"}],"breadcrumb":{"location":"/dictionary/drive-by-downloads","crumbs":[{"pathname":"/","crumbLabel":"Homepage"},{"pathname":"/dictionary","crumbLabel":"dictionary"},{"pathname":"/dictionary/drive-by-downloads","crumbLabel":"drive-by-downloads"}]}}},"staticQueryHashes":["1614255152"]}