The drive-by download was designed to install malicious software on the victim's computer.
The drive-by download was part of a larger cyber attack on the company's network.
The drive-by download took advantage of a known vulnerability exploit in the browser.
The drive-by download posed a serious security threat to the organization's data.
The drive-by download targeted vulnerabilities in the victim's internet browser.