How to stop "Drive by exploit"

Special Offer

The virus may spoil your computer and corrupt important data. The risk is increasing, if malware stays on the system for a long time. Scan the system to detect infected elements and to protect the PC from virus consequences.

Antivirus scanner

SpyHunter's scanner is only for malware detection. If the program detects a threat on the computer, you will need to purchase SpyHunter antimalware full version to delete or to fix infected elements. Uninstall steps and additional information EULA , Privacy Policy and Threat Assessment Criteria.


Trojan that send to email messages with "Drive by exploit" is a new dangerous virus. In the article we describe the methods of trojan infections and the possibilities to guard the system from it. We give common but helpful instructions that will assist you to delete "Drive by exploit", and any consequences of its actions in few minutes.

Hi, I’m a hacker and programmer, I know one of your password is: ...

Your computer was infected with my private malware, because your browser wasn’t updated/patched, in such case it’s enough to just visit some website where my iframe is placed to get automatically infected, if you want to find out more – Google: “Drive-by exploit”.

My malware gave me full access to all your accounts (see password above), full control over your computer and it was possible for me to spy on you over your webcam.

I collected all your private data, recorded few videos of you (through your webcam) and I RECORDED YOU SATISFYING YOURSELF!!!

I can publish all your private data everywhere, including the darknet, where the very sick people are and the videos of you, send them to your contacts, post them on social network and everywhere else!

Only you can prevent me from doing this and only I can help you out, there are no traces left, as I removed my malware after my job was done and this email(s) has been sent from some hacked server…

The only way to stop me, is to pay exactly 800$ in bitcoin (BTC).

It’s a very good offer, compared to all that HORRIBLE shit that will happen if you don’t pay!

You can easily buy bitcoin here: , , or check for bitcoin ATM near you, or Google for other exchanger.

You can send the bitcoin directly to my wallet, or create your own wallet first here: , then receive and send to mine.

My bitcoin wallet is: ...

Copy and paste it, it’s ...

You got 3 days time.

As I got access to this email account, I will know if this email has been read.

If you get this email multiple times, it’s to make sure that you read it, my mailer script is configured like this and after payment you can ignore it.

After receiving the payment, I remove all your data and you can life your live in peace like before.

Next time update your browser before browsing the web!

This scam has nothing involved to the real Drive-by exploit. The fact is the hackers just use the trojan name to trick user. The same scam message came from RAT software.

The methods to stop it are utterly the same: change your important passwords and scan system by antivirus scanner. Manual instructions how to detect and remove trojan have given in the next paragraph.

"Drive by exploit" removal instruction

If you are MAC user, follow this guide How to remove virus from MAC

Usually we propose two methods to remove undesired software, but in this case, dealing with Trojans, it's almost impossible to reveal and remove them by hand. Trojan can be in the files of any of your programs, so a novice customer can slip up, remove a crucial data and cause a system failure. If you don't want such things to happen, we've compiled a guide that will help you to get rid of "Drive by exploit" quickly and efficiently. The first stage is to go into Safe Mode and check system data. The second stage is downloading and installing Spyhunter anti-viral tool. After that - follow the guide, and after a few minutes the system will be good again.

Step 1. Boot into Safe mode

Safe mode

Start -> Msconfig.exe

Safe mode. Step 1

On the tab Boot select Safe boot

Safe mode. Step 2

Step 2. Check Startup folder

Start -> Msconfig.exe ->Disable unknown programs in the Startup tab


Step 3. Check hosts file

Modify hosts file, that located in C:\Windows\System32\drivers\etc\ .

Hosts file.Step 1

Open the file with Notepad and delete suspicious strings.

Hosts file.Step 2

It has to look like this:

Hosts file.Step 3

Step 4. Scan the system with antiviral scanner

Remember that there's no have to buy Spyhunter right now - there's a possibility to familiarize with its advantages by installing a free version with limited functionality. If you're interested in purchasing Spyhunter or need some additional info - click on the link under this paragraph.

Special Offer

Antivirus scanner

Why we recommend SpyHunter antimalware

Detects most kind of threats: malicious files and even registry keys of malware will be found

Protects your system in the future

24/7 free support team

SpyHunter's scanner is only for malware detection. If program detects infected elements on the computer, you will need to purchase malware removal tool for $39,99 to delete threats. SpyHunter has Free Trial for one remediation and removal, subject to a 48-hour waiting period. Uninstall steps and additional information EULA , Privacy Policy and Threat Assessment Criteria.

Step 5. Disable Safe mode

Start -> Msconfig.exe ->Disable Safe boot in the Boot tab

Deactivate Safe mode

Video guide

What trojan is



Experts declare that Trojans make up the largest percentage of all malicious software, according to usability and effectiveness. The regular examples of these purposes are botnets building, spying on the user, downloading and controlling already installed adware or theft of passwords and crucial data. Despite the abundance of strengths, Trojans have one important weakness - they cannot get into customer's system without his help. In recent years, people started to think that any dangerous or advertising tools are viruses, but strictly speaking, viruses, unlike Trojans, can easily distribute themselves and infect the unprotected PC. Trojan programs cannot clone themselves, and can’t get into the device without user's assistance. There's only thing that Trojan virus is capable of doing before infecting the device is to wait until some trustful victim downloads it and installs it. All things that are written in this paragraph bring us to an easy solution: Trojan viruses have to be found and avoided until they infect the PC.

There's a widespread (and bad) idea that AV tool is capable of defending the computer from malware. No AV program can protect your machine if you daily download and install adware. To ensure protection, you should reconsider your habits, and act prudently on the Internet. You can achieve this goal through two simple methods:

  • The safest choice is to fully stop using utilities of dubious provenance. These principles concern all the tools downloaded not from website of its developer or licensed vendors. Obviously, all cracked copies of good software should also be considered potentially harmful. If you stop downloading suchlike tools, the chances of infection would be lowered to a minimum, and AV-software will be able to quickly deal with this minimum.
  • If you're not prepared to totally forget about using unlicensed utilities, you must carefully examine each installed utility. Trojans commonly lurk under the guise of decent programs such as system optimizers, AV programs, browser games, driver updaters, browsers and search engines. Do not download suspicious utilities from this list, and while installing another pirated program - watch closely at the installation, declining all offers for installing more programs.

Use these advices and you will clearly see their fruits: the PC will be workable, quick and clean, and will be so forever.

This website uses cookies to improve your experience. If you continue using the site, we will assume that you accept our cookies policy.