On January 20, 2026, Indian cybersecurity firm MicroWorld Technologies suffered a supply chain attack impacting its eScan antivirus product line. An attacker gained unauthorized access to a regional update server and replaced a legitimate update file with a malicious payload. This resulted in eScan customers receiving and executing malware disguised as a legitimate update. The security firm Morphisec, which discovered the attack, reported that the malware, named Reload.exe, first disables the host's ability to receive further updates by modifying the HOSTS file. It then establishes persistence and downloads additional malware. MicroWorld has acknowledged the incident but disputes the characterization, creating a public disagreement over the nature of the breach. Due to the tampering, automatic remediation is not possible, requiring manual intervention from affected users.
This incident is a classic example of a supply chain attack, where a trusted vendor's infrastructure is compromised to distribute malware to its customers. By compromising the update mechanism of a security product, the attackers turned a tool of defense into a vector for infection.
Attack Vector: The attackers compromised one of eScan's regional update servers. They replaced a legitimate update file with a malicious executable, Reload.exe. When eScan clients performed a routine update check, they downloaded and executed this malicious file, believing it to be a trusted part of the antivirus software.
The infection chain is designed for stealth and persistence:
Reload.exe file is executed on the victim's machine with system privileges, as it is launched by the antivirus software itself.HOSTS file (C:\Windows\System32\drivers\etc\hosts). It adds entries that redirect eScan's update domains to a non-routable IP address (e.g., 127.0.0.1). This prevents the compromised machine from contacting the legitimate update servers, effectively freezing the antivirus definitions and blocking any potential cleanup updates from the vendor.The TTPs observed in this attack are indicative of a well-planned operation:
T1195.002 - Compromise Software Supply Chain: The core of the attack, where the attackers compromised the vendor's update infrastructure to distribute malware.T1574.002 - Hijack Execution Flow: DLL Side-Loading: While not explicitly DLL side-loading, the principle of replacing a legitimate executable with a malicious one is similar.T1562.001 - Disable or Modify Tools: The malware actively disables the security software that is meant to protect the system.T1053.005 - Scheduled Task/Job: Scheduled Task: Used to establish a persistent foothold on the compromised system.T1105 - Ingress Tool Transfer: The malware downloads further payloads from a C2 server.| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
file_name |
Reload.exe |
The name of the malicious executable distributed by the compromised update server. | EDR logs, file system analysis | high |
file_path |
C:\Windows\System32\drivers\etc\hosts |
The HOSTS file is modified by the malware. Monitor for unexpected changes. | File integrity monitoring (FIM) | high |
string_pattern |
update.escanav.com |
The malware adds entries for eScan domains to the HOSTS file. Look for these domains being redirected. | HOSTS file content analysis | high |
process_name |
Reload.exe |
The process name of the malware. | EDR process monitoring | high |
event_id |
4657 |
A registry value was modified. The malware may modify registry keys for persistence or configuration. | Windows Security Event Log | medium |
HOSTS file. Monitor for the creation of new scheduled tasks, especially those pointing to unfamiliar executables. EDR solutions should be configured to alert on processes that modify critical system files or attempt to disable other security tools.HOSTS file for entries related to eScan or MicroWorld. Do not rely on the installed eScan product for remediation. Contact eScan support to obtain their manual cleaning utility. Conduct a full forensic analysis to determine what secondary payloads may have been installed.Reload.exe or its subsequent payloads from executing. (M1038 - Execution Prevention)M1037 - Filter Network Traffic)Using application control or whitelisting can prevent unknown executables like 'Reload.exe' from running.
Mapped D3FEND Techniques:
Auditing and monitoring for changes to critical system files like the HOSTS file can provide early detection of this type of tampering.
Mapped D3FEND Techniques:
Implementing egress filtering can block the malware from connecting to its C2 server to download secondary payloads.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats