Phishing Alert: How Hackers Use Windows Search to Sneak in Malware

Phishing campaigns now exploit the Windows search protocol to deliver malware via HTML attachments. These sneaky emails use search-ms URIs to push malicious files from remote servers. To defend against this threat, consider disabling the search-ms URI protocol, but be cautious of impacting legitimate applications.

Hot Take:

Who knew the Windows search bar could be the ultimate treasure hunt for malware? It’s like a game of “Find the Virus,” but with way fewer fun prizes and way more headaches.

Key Points:

  • New phishing campaign uses HTML attachments to exploit Windows Search protocol.
  • HTML attachments disguised as invoices prompt Windows searches on remote servers.
  • Attackers use Cloudflare to mask malicious servers and present remote resources as local files.
  • Trustwave recommends deleting specific registry entries to mitigate the threat.
  • Deleting registry entries may disrupt legitimate Windows functions.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here