On January 20, 2026, Indian cybersecurity firm MicroWorld Technologies suffered a supply chain attack impacting its eScan antivirus product line. An attacker gained unauthorized access to a regional update server and replaced a legitimate update file with a malicious payload. This resulted in eScan customers receiving and executing malware disguised as a legitimate update. The security firm Morphisec, which discovered the attack, reported that the malware, named Reload.exe, first disables the host's ability to receive further updates by modifying the HOSTS file. It then establishes persistence and downloads additional malware. MicroWorld has acknowledged the incident but disputes the characterization, creating a public disagreement over the nature of the breach. Due to the tampering, automatic remediation is not possible, requiring manual intervention from affected users.
This incident is a classic example of a supply chain attack, where a trusted vendor's infrastructure is compromised to distribute malware to its customers. By compromising the update mechanism of a security product, the attackers turned a tool of defense into a vector for infection.
Attack Vector: The attackers compromised one of eScan's regional update servers. They replaced a legitimate update file with a malicious executable, Reload.exe. When eScan clients performed a routine update check, they downloaded and executed this malicious file, believing it to be a trusted part of the antivirus software.
The infection chain is designed for stealth and persistence:
Reload.exe file is executed on the victim's machine with system privileges, as it is launched by the antivirus software itself.HOSTS file (C:\Windows\System32\drivers\etc\hosts). It adds entries that redirect eScan's update domains to a non-routable IP address (e.g., 127.0.0.1). This prevents the compromised machine from contacting the legitimate update servers, effectively freezing the antivirus definitions and blocking any potential cleanup updates from the vendor.The TTPs observed in this attack are indicative of a well-planned operation:
T1195.002 - Compromise Software Supply Chain: The core of the attack, where the attackers compromised the vendor's update infrastructure to distribute malware.T1574.002 - Hijack Execution Flow: DLL Side-Loading: While not explicitly DLL side-loading, the principle of replacing a legitimate executable with a malicious one is similar.T1562.001 - Disable or Modify Tools: The malware actively disables the security software that is meant to protect the system.T1053.005 - Scheduled Task/Job: Scheduled Task: Used to establish a persistent foothold on the compromised system.T1105 - Ingress Tool Transfer: The malware downloads further payloads from a C2 server.file_nameReload.exefile_pathC:\Windows\System32\drivers\etc\hostsstring_patternupdate.escanav.comprocess_nameReload.exeevent_id4657HOSTS file. Monitor for the creation of new scheduled tasks, especially those pointing to unfamiliar executables. EDR solutions should be configured to alert on processes that modify critical system files or attempt to disable other security tools.HOSTS file for entries related to eScan or MicroWorld. Do not rely on the installed eScan product for remediation. Contact eScan support to obtain their manual cleaning utility. Conduct a full forensic analysis to determine what secondary payloads may have been installed.Reload.exe or its subsequent payloads from executing. (M1038 - Execution Prevention)M1037 - Filter Network Traffic)Using application control or whitelisting can prevent unknown executables like 'Reload.exe' from running.
Mapped D3FEND Techniques:
Auditing and monitoring for changes to critical system files like the HOSTS file can provide early detection of this type of tampering.
Mapped D3FEND Techniques:
Implementing egress filtering can block the malware from connecting to its C2 server to download secondary payloads.
Mapped D3FEND Techniques:
MicroWorld Technologies detects unauthorized access to a regional update server and distributes the malicious 'Reload.exe' file.
MicroWorld sends a security advisory to its customers about the incident.
Security firm Morphisec publicly details the supply chain attack.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.