When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
The HTML file opens up the web app and forces it to directly interact with Windows Explorers search function.
This script, if activated, triggers additional malicious operations.
Therefore, it is impossible to know what kind of malware the attackers were distributing.
To mitigate the threat, users could disable search-ms/search URI protocol handlers by deleting associated registry entries.