Phishing Alert: How Hackers Use Windows Search to Sneak in Malware
Phishing campaigns now exploit the Windows search protocol to deliver malware via HTML attachments. These sneaky emails use search-ms URIs to push malicious files from remote servers. To defend against this threat, consider disabling the search-ms URI protocol, but be cautious of impacting legitimate applications.

Hot Take:
Who knew the Windows search bar could be the ultimate treasure hunt for malware? It’s like a game of “Find the Virus,” but with way fewer fun prizes and way more headaches.
Key Points:
- New phishing campaign uses HTML attachments to exploit Windows Search protocol.
- HTML attachments disguised as invoices prompt Windows searches on remote servers.
- Attackers use Cloudflare to mask malicious servers and present remote resources as local files.
- Trustwave recommends deleting specific registry entries to mitigate the threat.
- Deleting registry entries may disrupt legitimate Windows functions.
Already a member? Log in here