Drive by Exploit
The Drive by Exploit is an example of an email spam campaign aimed at threatening the email recipients about a supposed account breach. The Drive by Exploit email campaign is also known as a sextortion email scam. The perpetrators behind the Drive by Exploit use intimidation to threaten with the potential release of sensitive personal information.

If you think that a malicious program known under the name of Drive by Exploit is currently present somewhere in your system, we advise you to stay on the current page and read the information this article offers. Here, you can learn some important details about the specifics of this malware program, its potential harmful abilities, and about the options you have regarding its removal from your computer.
Drive-by Exploit Email
The Drive-by Exploit is an email scam campaign intended to scare the targets into believing their respective systems’ have been compromised. Drive-by Exploit is also referred to as a sextortion scam, because of the nature of the threat behind it.

The Drive-by exploit email lets you know you are infected:
Hi, I’m a hacker and programmer, I know one of your password is: *******************
Your computer was infected with my private malware, because your browser wasn’t updated / patched, in such case it’s enough to just visit some website where my iframe is placed to get automatically infected, if you want to find out more – Google: “Drive-by exploit”.
My malware gave me full access to all your accounts (see password above), full control over your computer and it was possible for me to spy on you over your webcam.
I collected all your private data, recorded few videos of you (through your webcam) and I RECORDED YOU SATISFYING YOURSELF!!!
I can publish all your private data everywhere, including the darknet, where the very sick people are and the videos of you, send them to your contacts, post them on social network and everywhere else!
Only you can prevent me from doing this and only I can help you out, there are no traces left, as I removed my malware after my job was done and this email(s) has been sent from some hacked server…
The only way to stop me, is to pay exactly 800$ in bitcoin (BTC).
It’s a very good offer, compared to all that HORRIBLE shit that will happen if you don’t pay!
You can easily buy bitcoin here: www.paxful.com , www.coinbase.com , or check for bitcoin ATM near you, or Google for other exchanger.
You can send the bitcoin directly to my wallet, or create your own wallet first here: www.login.blockchain.com/en/#/signup/ , then receive and send to mine.
My bitcoin wallet is: **************************************
Copy and paste it, it’s (cAsE-sEnSEtiVE)
You got 3 days time.
As I got access to this email account, I will know if this email has been read.
If you get this email multiple times, it’s to make sure that you read it, my mailer script is configured like this and after payment you can ignore it.
After receiving the payment, I remove all your data and you can life your live in peace like before.
Next time update your browser before browsing the web!
Drive by Exploit Scam
The Drive by Exploit Scam is an email intimidation spam campaign aimed at extorting money. The Drive by Exploit scam implies that your email has been compromised and you need to pay a ransom to prevent embarrassing personal data from being leaked. However, the Drive by Exploit email is just a scam.
As you may or may not know, Drive by Exploit is a Trojan horse infection. Unlike regular computer viruses, this threat doesn’t replicate its data – usually, removing all of its initial files and system entries should be enough to make this threat disappear. However, since Drive by Exploit is a Trojan, it is probably able to hide its data and system registry entries very well. Many Trojans use disguises for their data and the processes they run in your Task Manager. For example, the processes of a Trojan like Drive by Exploit may have their names appear the same or almost identical to the names of actual OS processes. In some cases, a given system process may actually get hijacked by the Trojan and be used by it as a disguise. This can make it really difficult to end the malware process without messing with any actual important system processes. The same can be said about the files of most Trojans – they can have names of system files, or they may be hidden in system folders, where it’s difficult to find them. To successfully fight an infection of this kind, you need to execute all the steps from the removal guide we’ve prepared for you exactly as they are written, and you are also advised to try the professional anti-malware program that can be found linked in the guide.
Drive by Exploit: Harmful abilities
Trojans are among the most multi-functional forms of computer malware – they are known for their many potential uses and their high versatility. Because of this and because of the fact that Drive by Exploit has just been released and there isn’t enough research done on it, we cannot give you any specific information about the exact purpose of this threat. However, since we have covered many Trojans in the past, we can give you an idea about the potential harmful capabilities of the representatives of this malware category.
Espionage is one common use for threats of the Trojan horse family. Some of them can keylog whatever you type on your keyboard, take screenshots of your screen, and even exploit your webcam as a direct espionage tool, allowing the hackers to look directly at you, and into your room. Another possible use of such threats is as backdoor tools – when a Trojan is used in this way, it is able to insert another malware piece into the already infiltrated computer. Ransomware crypto viruses, for example, are oftentimes distributed with the help of a backdoor Trojan. A lot of Trojans are also able to give their creators direct access to your computer. Understandably, this opens a whole world of possibilities in which your computer can be exploited. Although we can’t tell you what Drive by Exploit may be up to while in your system, there is no doubt that you must eliminate the threat the first opportunity you get, or else the consequences can be really severe.
SUMMARY:
Drive by Exploit Email Fix
You are dealing with a malware infection that can restore itself unless you remove its core files. We are sending you to another page with a removal guide that gets regularly updated. It covers in-depth instructions on how to:
1. Locate and scan malicious processes in your task manager.
2. Identify in your Control panel any programs installed with the malware, and how to remove them. Search Marquis is a high-profile hijacker that gets installed with a lot of malware.
3. How to clean up and reset your browser to its original settings without the malware returning.
You can find the removal guide here.
For mobile devices refer to these guides instead: Android, iPhone
Leave a Reply