I've been reading a lot on here about malicious downloads from browsing sites, drive by downloads, etc, but never heard talk about how the download happens, and how it would bypass the internal download of the browser. In most browsers you will be notified when you are downloading something, i.e., chrome shows all downloads at the bottom in it's own tray.
It seems to me that these malicious downloads are stealthy, which would mean that they would work around any built in browser downloader.
My question is, if this is indeed the case of getting around it, how is that possible, and what methods are being used to stop this, and is there anything we on the client can do?
If this isn't the case, then does that mean it downloads as a regular file, in which ignorant users will then run the program?
I've ran into a situation on someone I know's computer where they visited a site and they had additional extensions downloaded into their chrome browser that caused sketchy things such as a fake Google "new tab" page. So to me, it seems as if a lot of this can happen without the user allowing it (or they don't know they allowed it?).
EDIT: I found this question Do drive by download attacks include malicious file downloading?
Which doesn't exactly answer my question, but adds to it saying that a user would have to run a file, or malicious JS running, activeX, Java, etc, but I'm curious if there's a way around the downloaders, in that malicious code is downloaded to your machine. It also would seem the user might need to run it, but at the same time, maybe not... I guess it would depend on what the malicious code actually is, and what it's attacking you through? i.e., is it a file, or Java, or Adobe Flash, etc...