Supply Chain Attack: eScan Antivirus Update Server Compromised to Distribute Malware

eScan Antivirus Becomes Malware Vector After Regional Update Server is Breached in Supply Chain Attack

HIGH
February 1, 2026
6m read
Supply Chain AttackMalwareIncident Response

Related Entities

Products & Tech

eScan

Other

MicroWorld Technologies MorphisecReload.exe

Full Report

Executive Summary

On January 20, 2026, Indian cybersecurity firm MicroWorld Technologies suffered a supply chain attack impacting its eScan antivirus product line. An attacker gained unauthorized access to a regional update server and replaced a legitimate update file with a malicious payload. This resulted in eScan customers receiving and executing malware disguised as a legitimate update. The security firm Morphisec, which discovered the attack, reported that the malware, named Reload.exe, first disables the host's ability to receive further updates by modifying the HOSTS file. It then establishes persistence and downloads additional malware. MicroWorld has acknowledged the incident but disputes the characterization, creating a public disagreement over the nature of the breach. Due to the tampering, automatic remediation is not possible, requiring manual intervention from affected users.


Threat Overview

This incident is a classic example of a supply chain attack, where a trusted vendor's infrastructure is compromised to distribute malware to its customers. By compromising the update mechanism of a security product, the attackers turned a tool of defense into a vector for infection.

Attack Vector: The attackers compromised one of eScan's regional update servers. They replaced a legitimate update file with a malicious executable, Reload.exe. When eScan clients performed a routine update check, they downloaded and executed this malicious file, believing it to be a trusted part of the antivirus software.

Malware Analysis: Reload.exe

The infection chain is designed for stealth and persistence:

  1. Execution: The Reload.exe file is executed on the victim's machine with system privileges, as it is launched by the antivirus software itself.
  2. Defense Evasion: The malware's first action is to modify the local HOSTS file (C:\Windows\System32\drivers\etc\hosts). It adds entries that redirect eScan's update domains to a non-routable IP address (e.g., 127.0.0.1). This prevents the compromised machine from contacting the legitimate update servers, effectively freezing the antivirus definitions and blocking any potential cleanup updates from the vendor.
  3. Persistence: The malware establishes persistence by creating scheduled tasks that ensure it runs automatically upon system startup or at regular intervals.
  4. Payload Delivery: Once entrenched, the malware contacts an attacker-controlled command-and-control (C2) server to download and execute additional malicious payloads. The nature of these secondary payloads has not been disclosed but could range from spyware and credential stealers to ransomware.

Technical Analysis

The TTPs observed in this attack are indicative of a well-planned operation:

Impact Assessment

  • Erosion of Trust: A supply chain attack on a security vendor is particularly damaging as it undermines the trust between the vendor and its customers. Users rely on these products for protection, and when they become the source of infection, it creates a significant crisis of confidence.
  • Widespread Compromise: The attack potentially affects the entire eScan user base that received the malicious update, including both enterprise and consumer clients globally.
  • Difficult Remediation: Because the malware blocks the update mechanism, automated fixes cannot be pushed. Each affected machine must be cleaned manually, a time-consuming and costly process for enterprise customers.
  • Data Breach Potential: The secondary payloads delivered by the initial malware could lead to widespread data breaches, credential theft, and ransomware incidents across the affected user base.

Cyber Observables for Detection

Type Value Description Context Confidence
file_name Reload.exe The name of the malicious executable distributed by the compromised update server. EDR logs, file system analysis high
file_path C:\Windows\System32\drivers\etc\hosts The HOSTS file is modified by the malware. Monitor for unexpected changes. File integrity monitoring (FIM) high
string_pattern update.escanav.com The malware adds entries for eScan domains to the HOSTS file. Look for these domains being redirected. HOSTS file content analysis high
process_name Reload.exe The process name of the malware. EDR process monitoring high
event_id 4657 A registry value was modified. The malware may modify registry keys for persistence or configuration. Windows Security Event Log medium

Detection & Response

  • Detect: Use File Integrity Monitoring (FIM) to alert on any modifications to the HOSTS file. Monitor for the creation of new scheduled tasks, especially those pointing to unfamiliar executables. EDR solutions should be configured to alert on processes that modify critical system files or attempt to disable other security tools.
  • Response: If a compromise is suspected, immediately isolate the affected machine. Manually inspect the HOSTS file for entries related to eScan or MicroWorld. Do not rely on the installed eScan product for remediation. Contact eScan support to obtain their manual cleaning utility. Conduct a full forensic analysis to determine what secondary payloads may have been installed.

Mitigation

  • Defense in Depth: Do not rely on a single security product. A layered security approach with EDR, network monitoring, and application control can provide overlapping coverage and may detect or prevent secondary payloads even if the primary AV is compromised.
  • Application Whitelisting: Implement application control policies that only allow known, trusted executables to run. This could prevent Reload.exe or its subsequent payloads from executing. (M1038 - Execution Prevention)
  • Vendor Risk Management: This incident highlights the importance of robust vendor risk management programs. Organizations should scrutinize the security practices of their critical software suppliers.
  • Egress Filtering: Implement strict egress filtering rules on firewalls to block outbound connections from endpoints to unknown or uncategorized domains, which can prevent malware from contacting its C2 server. (M1037 - Filter Network Traffic)

Timeline of Events

1
January 20, 2026
MicroWorld Technologies detects unauthorized access to a regional update server and distributes the malicious 'Reload.exe' file.
2
January 22, 2026
MicroWorld sends a security advisory to its customers about the incident.
3
January 29, 2026
Security firm Morphisec publicly details the supply chain attack.
4
February 1, 2026
This article was published

MITRE ATT&CK Mitigations

Using application control or whitelisting can prevent unknown executables like 'Reload.exe' from running.

Mapped D3FEND Techniques:

Auditing and monitoring for changes to critical system files like the HOSTS file can provide early detection of this type of tampering.

Mapped D3FEND Techniques:

Implementing egress filtering can block the malware from connecting to its C2 server to download secondary payloads.

Mapped D3FEND Techniques:

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Supply Chain AttackeScanAntivirusMalwareReload.exeHOSTS file

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading