Drive by Exploit


Drive by Exploit

The Drive by Exploit is an example of an email spam campaign aimed at threatening the email recipients about a supposed account breach. The Drive by Exploit email campaign is also known as a sextortion email scam. The perpetrators behind the Drive by Exploit use intimidation to threaten with the potential release of sensitive personal information.

 

Drive by Exploit

The antivirus scans help us see the nature of the Drive by Exploit Email

If you think that a malicious program known under the name of Drive by Exploit is currently present somewhere in your system, we advise you to stay on the current page and read the information this article offers. Here, you can learn some important details about the specifics of this malware program, its potential harmful abilities, and about the options you have regarding its removal from your computer.

Drive-by Exploit Email

The Drive-by Exploit is an email scam campaign intended to scare the targets into believing their respective systems’ have been compromised. Drive-by Exploit is also referred to as a sextortion scam, because of the nature of the threat behind it.

Drive by Exploit

Drive by exploit Email

The Drive-by exploit email lets you know you are infected:

Hi, I’m a hacker and programmer, I know one of your password is: *******************
Your computer was infected with my private malware, because your browser wasn’t updated / patched, in such case it’s enough to just visit some website where my iframe is placed to get automatically infected, if you want to find out more – Google: “Drive-by exploit”
My malware gave me full access to all your accounts (see password above), full control over your computer and it was possible for me to spy on you over your webcam. 
I collected all your private data, recorded few videos of you (through your webcam) and I RECORDED YOU SATISFYING YOURSELF!!! 
I can publish all your private data everywhere, including the darknet, where the very sick people are and the videos of you, send them to your contacts, post them on social network and everywhere else!
Only you can prevent me from doing this and only I can help you out, there are no traces left, as I removed my malware after my job was done and this email(s) has been sent from some hacked server… 
The only way to stop me, is to pay exactly 800$ in bitcoin (BTC). 
It’s a very good offer, compared to all that HORRIBLE shit that will happen if you don’t pay! 
You can easily buy bitcoin here: www.paxful.com , www.coinbase.com , or check for bitcoin ATM near you, or Google for other exchanger. 
You can send the bitcoin directly to my wallet, or create your own wallet first here: www.login.blockchain.com/en/#/signup/ , then receive and send to mine. 
My bitcoin wallet is: **************************************
Copy and paste it, it’s (cAsE-sEnSEtiVE) 
You got 3 days time. 
As I got access to this email account, I will know if this email has been read. 
If you get this email multiple times, it’s to make sure that you read it, my mailer script is configured like this and after payment you can ignore it. 
After receiving the payment, I remove all your data and you can life your live in peace like before. 
Next time update your browser before browsing the web!

Drive by Exploit Scam

The Drive by Exploit Scam is an email intimidation spam campaign aimed at extorting money. The Drive by Exploit scam implies that your email has been compromised and you need to pay a ransom to prevent embarrassing personal data from being leaked. However, the Drive by Exploit email is just a scam.

As you may or may not know, Drive by Exploit is a Trojan horse infection. Unlike regular computer viruses, this threat doesn’t replicate its data – usually, removing all of its initial files and system entries should be enough to make this threat disappear. However, since Drive by Exploit is a Trojan, it is probably able to hide its data and system registry entries very well. Many Trojans use disguises for their data and the processes they run in your Task Manager. For example, the processes of a Trojan like Drive by Exploit may have their names appear the same or almost identical to the names of actual OS processes. In some cases, a given system process may actually get hijacked by the Trojan and be used by it as a disguise. This can make it really difficult to end the malware process without messing with any actual important system processes. The same can be said about the files of most Trojans – they can have names of system files, or they may be hidden in system folders, where it’s difficult to find them. To successfully fight an infection of this kind, you need to execute all the steps from the removal guide we’ve prepared for you exactly as they are written, and you are also advised to try the professional anti-malware program that can be found linked in the guide.

Drive by Exploit: Harmful abilities

Trojans are among the most multi-functional forms of computer malware – they are known for their many potential uses and their high versatility. Because of this and because of the fact that Drive by Exploit has just been released and there isn’t enough research done on it, we cannot give you any specific information about the exact purpose of this threat. However, since we have covered many Trojans in the past, we can give you an idea about the potential harmful capabilities of the representatives of this malware category.

Espionage is one common use for threats of the Trojan horse family. Some of them can keylog whatever you type on your keyboard, take screenshots of your screen, and even exploit your webcam as a direct espionage tool, allowing the hackers to look directly at you, and into your room. Another possible use of such threats is as backdoor tools – when a Trojan is used in this way, it is able to insert another malware piece into the already infiltrated computer. Ransomware crypto viruses, for example, are oftentimes distributed with the help of a backdoor Trojan. A lot of Trojans are also able to give their creators direct access to your computer. Understandably, this opens a whole world of possibilities in which your computer can be exploited. Although we can’t tell you what Drive by Exploit may be up to while in your system, there is no doubt that you must eliminate the threat the first opportunity you get, or else the consequences can be really severe.

SUMMARY:

Name Drive by Exploit
Type Trojan
Danger Level High (Trojans are often used as a backdoor for Ransomware)
Symptoms Trojans rarely show visible symptoms and due to this they usually require professional software to be detected.
Distribution Method Spam, cracked software, infected installers, ads, malicious email attachments, torrents.
Detection Tool

Drive by Exploit Email Fix

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide


Drive by Exploit

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

Drive by Exploit

WARNING! READ CAREFULLY BEFORE PROCEEDING!

Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 

Drive by Exploit

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drive by Exploit
Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at: https://howtoremove.guide/online-virus-scanner/




Scan Results


Virus Scanner Result
Drive by ExploitClamAV
Drive by ExploitAVG AV
Drive by ExploitMaldet


After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 

Drive by Exploit

Hold together the Start Key and R. Type appwiz.cpl –> OK.

Drive by Exploit

You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:

Drive by Exploit

Drive by Exploit

Type msconfig in the search field and hit enter. A window will pop-up:

Drive by Exploit

Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

Drive by Exploit

If there are suspicious IPs below “Localhost” – write to us in the comments.

Drive by Exploit

Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

blank

About the author

blank

Lidia Howler

Lidia is a web content creator with years of experience in the cyber-security sector. She helps readers with articles on malware removal and online security. Her strive for simplicity and well-researched information provides users with easy-to-follow It-related tips and step-by-step tutorials.

16 Comments

  • This is not a virus! IT’S JUST A SCAM! You do not have to go through all of this. Just change your passwords.

      • I have also had the same e-mail emailed to me in my junk mail, I always get junk mail on hotmail i copied the “Drive-by exploit” in the e-mail & googled it this is the second website i have looked on about it.

        • It came in my spam email to so just to be safe I called Microsoft and they told me to file a report with the spam site. The password they sent I had used on a couple of old sites but I’ve been using a different one on my important sites for a few months

      • Any time any site gets compromised that information finds it way to someone unscrupulous who makes such an e-mail.

        The one they got for me was : skyrim. I’d used that as a throwaway password on Nexusmods for Skyrim mods back when i wasn’t using a password manager to make up random ones for me.

        That site was hacked in 2015. Go to HaveIBeenPwned site to see what passwords related to your e-mail addresses have been hacked in the past.

        That said i don’t even have a webcam so this e-mail was moot for me (though i thought why not get informed and google this).

        If they had your passwords they would sell them instead or attempt to use it themselves (not a good idea for any but the best hackers).

        If they truly had your passwords they would show more than the one or two that may have been compromised by happenstance in the past.

        That said if the password shown is one which you use (in any form) for a serious website , reconsider your web security. Get a password manager. Good luck !

      • they know your password from one of the many breaches that facebook or other large entities face. Experian for example, its the same way people steal identities and such, identity lock or whatever can tell you what password from where is found on the darkweb. just change your passwords, the email is a scam they don’t have videos of you gratifying yourself, I have been getting this scam mail since the facebook exploit, however I don’t have any such videos or a webcam so how could such a video exist… just saying.

  • Thank goodness. I was feeling like…all I need to do is change my passwords…they gave me three days and I didn’t actually see the email until the sixth day (this exploit email was in my junk mail)…and nothing happen.

  • I received this message for the second time. Now I have 2 days to pay $1,400 to Bitcoin. How would I know it is a scam? please advise.

    • It’s almost certainly a scam. Still, if you want to be sure, you can use the recommended anti-malware tool from the guide on this page and scan your computer with it. If it finds anything, remove it to secure your machine.

  • Can the virus infect my phone? If so, how do I get rid of it or do I just delete the emails? They came In my spam email inbox.

    • It doesn’t exist as a virus. It hasn’t infected anyone’s phones or computers. It’s using email address and password combos from data breaches, and social engineering. See other comments.

  • This is a social engineering scam. There are many leaked e-mail and password combinations that have been dumped and accessible to unscrupulous individuals.

    Somebody took that data dump, created that e-mail form, and sent it to all the e-mail addresses and password combinations they have access to. User’s seeing an actual password they used, especially if it is re-used will short circuit their reasoning capabilities and be more likely to blindly follow the instructions.

    Nothing is stopping the author(s) of these e-mails from re-sending multiple times.

    In my case, the password they “knew” was the weak one I use on websites I suspect have weak security. I have checked that e-mail address for hits in known data leaks, and it has many hits. This tells me that they only have e-mail addresses and a passwords, and wrote an e-mail to make an optimal use of this combination.

    • Would you have suspected MySpace and Dailymotion of having weak security? What about Facebook? Sony?

      You can get a list of sites from which a password for your email address has been leaked at https :// haveibeenpwned. com/. You can also test a specific password for having appeared in a leak.

      Your computer/device has not been infected by this RAT. “After that I removed my malware to not leave any traces.” Good covering story; however, there are no traces because it was never there in the first place. There is no urgent need to follow the steps in this article, but they are useful checks to make from time to time (like checking the oil in your car).

  • I got the same email today so when I went on ‘haveibeenpwned’ and used their “search pwned password”, my password was not compromised.

    Why is that?

  • I received email today and I REQUESTED him that upload my satisfy video on all p/o/r.n site and send to some p’o’r/n producer so they can see me and hire me for the next project. If I get a project I will pay $10000. Hahahha

Leave a Comment