eScan confirms update server breached to push malicious update

by CybrGPT
0 comment

MicroWorld Technologies, the maker of the eScan antivirus product, has confirmed that one of its update servers was breached and used to distribute an unauthorized update later analyzed as malicious to a small subset of customers earlier this month.

The file was delivered to customers who downloaded updates from the regional update cluster during a two-hour window on January 20, 2026.

eScan says the affected infrastructure has since been isolated and rebuilt, authentication credentials have been rotated, and remediation has been made available to impacted customers.

Wiz

Security firm Morphisec separately published a technical report analyzing malicious activity observed on customer endpoints, which it associates with updates delivered from eScan’s update infrastructure during the same timeframe.

Morphisec states that it detected malicious activity on January 20, 2026, and later contacted eScan. MicroWorld Technologies told BleepingComputer it disputes Morphisec’s claims that it was the first to discover or report the incident.

According to eScan, the company detected the issue internally on January 20 through monitoring and customer reports, isolated the affected infrastructure within hours, and issued a security advisory on January 21. eScan says Morphisec contacted the company later, after publishing public claims about the incident.

eScan also disputes claims that affected customers were unaware of the issue, stating that it conducted proactive notifications and direct outreach to impacted customers while remediation was being finalized.

Update infrastructure breached

In its advisory, eScan classified the incident as an update infrastructure access incident, stating that unauthorized access to a regional update server configuration allowed an unauthorized file to be placed in the update distribution path.

“Unauthorized access to one of our regional update server configurations resulted in an incorrect file (patch configuration binary/corrupt update) being placed in the update distribution path,” reads an advisory shared with BleepingComputer by MicroWorld Technologies.

“This file was distributed to customers downloading updates from the affected server cluster during a limited timeframe on January 20, 2026.”

The company emphasized that the incident did not involve a vulnerability in the eScan product itself.

eScan stressed that only those whose software was updated from the specific regional cluster were impacted, while all other customers remained unaffected.

However, eScan says that those who installed the malicious update may have seen this behavior on their systems:

  • Update service failure notifications
  • Modified system hosts file preventing connection to eScan update servers
  • eScan update configuration file modifications
  • Inability to receive new security definition updates
  • Update unavailability popup on client machines

BleepingComputer contacted eScan with further questions on when its systems were initially breached and will update the story if we receive a reply back.

Update deployed to push malware

Morphisec’s security bulletin says that the malicious update pushed down a modified version of an eScan update component, “Reload.exe”.

“Malicious updates were distributed through eScan’s legitimate update infrastructure, resulting in the deployment of multi-stage malware to enterprise and consumer endpoints globally,” reads Morphisec’s bulletin.

While the modified Reload.exe is signed with what appears to be eScan’s code-signing certificate, both Windows and VirusTotal show the signature as invalid.

According to Morphisec, the Reload.exe file [VirusTotal] was used to enable persistence, execute commands, modify the Windows HOSTS file to prevent remote updates, and connect to the C2 infrastructure to download further payloads.

The researchers say the following command and control servers were observed:

hxxps[://]vhs[.]delrosal[.]net/i
hxxps[://]tumama[.]hns[.]to
hxxps[://]blackice[.]sol-domain[.]org
hxxps[://]codegiant[.]io/dd/dd/dd[.]git/download/main/middleware[.]ts
504e1a42.host.njalla[.]net
185.241.208[.]115

The final payload seen deployed was a file named CONSCTLX.exe [VirusTotal], which Morphisec acts as a backdoor and a persistent downloader. Morphisec says that the malicious files created scheduled tasks for persistence using names like “CorelDefrag”.

eScan has created a remediation update that customers can run to perform the following actions:

  • Automatically identifies and corrects incorrect modifications
  • Re-enables proper eScan update functionality
  • Verifies successful restoration
  • Requires standard system restart

Both eScan and Morphisec recommend that customers block the above command and control servers for additional security.

In 2024, North Korean hackers were observed exploiting the updating mechanism of eScan antivirus to plant backdoors on corporate networks.

Wiz

Whether you’re cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

Get the cheat sheet and take the guesswork out of secrets management.

Source link

You may also like

Leave a Comment

Stay informed with the latest cybersecurity news. Explore updates on malware, ransomware, data breaches, and online threats. Your trusted source for digital safety and cyber defense insights.

Weather Data Source: 30 tage wettervorhersage

Subscribe my Newsletter for new blog posts, tips & new photos. Let’s stay updated!