New drive-by download attacks don’t require user interaction to infect computers with malware. Instead, rogue JavaScript code is being added to local JS files that get loaded in the “head” section of every HTML page. The code injected into these local JavaScript files loads a different JS file from an external location, but only if mouse cursor movement is detected on the page. Attackers try to exploit remote code execution vulnerabilities in unpatched versions of browser plug-ins such as Java, Adobe Reader or Flash Player.”]

