eScan Antivirus Becomes Malware Vector After Regional Update Server is Breached in Supply Chain Attack

Supply Chain Attack: eScan Antivirus Update Server Compromised to Distribute Malware

HIGH
February 1, 2026
6m read
Supply Chain AttackMalwareIncident Response

Related Entities

Products & Tech

eScan

Other

MicroWorld Technologies MorphisecReload.exe

Full Report

Executive Summary

On January 20, 2026, Indian cybersecurity firm MicroWorld Technologies suffered a supply chain attack impacting its eScan antivirus product line. An attacker gained unauthorized access to a regional update server and replaced a legitimate update file with a malicious payload. This resulted in eScan customers receiving and executing malware disguised as a legitimate update. The security firm Morphisec, which discovered the attack, reported that the malware, named Reload.exe, first disables the host's ability to receive further updates by modifying the HOSTS file. It then establishes persistence and downloads additional malware. MicroWorld has acknowledged the incident but disputes the characterization, creating a public disagreement over the nature of the breach. Due to the tampering, automatic remediation is not possible, requiring manual intervention from affected users.


Threat Overview

This incident is a classic example of a supply chain attack, where a trusted vendor's infrastructure is compromised to distribute malware to its customers. By compromising the update mechanism of a security product, the attackers turned a tool of defense into a vector for infection.

Attack Vector: The attackers compromised one of eScan's regional update servers. They replaced a legitimate update file with a malicious executable, Reload.exe. When eScan clients performed a routine update check, they downloaded and executed this malicious file, believing it to be a trusted part of the antivirus software.

Malware Analysis: Reload.exe

The infection chain is designed for stealth and persistence:

  1. Execution: The Reload.exe file is executed on the victim's machine with system privileges, as it is launched by the antivirus software itself.
  2. Defense Evasion: The malware's first action is to modify the local HOSTS file (C:\Windows\System32\drivers\etc\hosts). It adds entries that redirect eScan's update domains to a non-routable IP address (e.g., 127.0.0.1). This prevents the compromised machine from contacting the legitimate update servers, effectively freezing the antivirus definitions and blocking any potential cleanup updates from the vendor.
  3. Persistence: The malware establishes persistence by creating scheduled tasks that ensure it runs automatically upon system startup or at regular intervals.
  4. Payload Delivery: Once entrenched, the malware contacts an attacker-controlled command-and-control (C2) server to download and execute additional malicious payloads. The nature of these secondary payloads has not been disclosed but could range from spyware and credential stealers to ransomware.

Technical Analysis

The TTPs observed in this attack are indicative of a well-planned operation:

Impact Assessment

  • Erosion of Trust: A supply chain attack on a security vendor is particularly damaging as it undermines the trust between the vendor and its customers. Users rely on these products for protection, and when they become the source of infection, it creates a significant crisis of confidence.
  • Widespread Compromise: The attack potentially affects the entire eScan user base that received the malicious update, including both enterprise and consumer clients globally.
  • Difficult Remediation: Because the malware blocks the update mechanism, automated fixes cannot be pushed. Each affected machine must be cleaned manually, a time-consuming and costly process for enterprise customers.
  • Data Breach Potential: The secondary payloads delivered by the initial malware could lead to widespread data breaches, credential theft, and ransomware incidents across the affected user base.

Cyber Observables for Detection

Type
file_name
Value
Reload.exe
Description
The name of the malicious executable distributed by the compromised update server.
Context
EDR logs, file system analysis
Confidence
high
Type
file_path
Value
C:\Windows\System32\drivers\etc\hosts
Description
The HOSTS file is modified by the malware. Monitor for unexpected changes.
Context
File integrity monitoring (FIM)
Confidence
high
Type
string_pattern
Value
update.escanav.com
Description
The malware adds entries for eScan domains to the HOSTS file. Look for these domains being redirected.
Context
HOSTS file content analysis
Confidence
high
Type
process_name
Value
Reload.exe
Description
The process name of the malware.
Context
EDR process monitoring
Confidence
high
Type
event_id
Value
4657
Description
A registry value was modified. The malware may modify registry keys for persistence or configuration.
Context
Windows Security Event Log
Confidence
medium

Detection & Response

  • Detect: Use File Integrity Monitoring (FIM) to alert on any modifications to the HOSTS file. Monitor for the creation of new scheduled tasks, especially those pointing to unfamiliar executables. EDR solutions should be configured to alert on processes that modify critical system files or attempt to disable other security tools.
  • Response: If a compromise is suspected, immediately isolate the affected machine. Manually inspect the HOSTS file for entries related to eScan or MicroWorld. Do not rely on the installed eScan product for remediation. Contact eScan support to obtain their manual cleaning utility. Conduct a full forensic analysis to determine what secondary payloads may have been installed.

Mitigation

  • Defense in Depth: Do not rely on a single security product. A layered security approach with EDR, network monitoring, and application control can provide overlapping coverage and may detect or prevent secondary payloads even if the primary AV is compromised.
  • Application Whitelisting: Implement application control policies that only allow known, trusted executables to run. This could prevent Reload.exe or its subsequent payloads from executing. (M1038 - Execution Prevention)
  • Vendor Risk Management: This incident highlights the importance of robust vendor risk management programs. Organizations should scrutinize the security practices of their critical software suppliers.
  • Egress Filtering: Implement strict egress filtering rules on firewalls to block outbound connections from endpoints to unknown or uncategorized domains, which can prevent malware from contacting its C2 server. (M1037 - Filter Network Traffic)

Timeline of Events

1
January 20, 2026
MicroWorld Technologies detects unauthorized access to a regional update server and distributes the malicious 'Reload.exe' file.
2
January 22, 2026
MicroWorld sends a security advisory to its customers about the incident.
3
January 29, 2026
Security firm Morphisec publicly details the supply chain attack.
4
February 1, 2026
This article was published

MITRE ATT&CK Mitigations

Using application control or whitelisting can prevent unknown executables like 'Reload.exe' from running.

Mapped D3FEND Techniques:

Auditing and monitoring for changes to critical system files like the HOSTS file can provide early detection of this type of tampering.

Mapped D3FEND Techniques:

Implementing egress filtering can block the malware from connecting to its C2 server to download secondary payloads.

Mapped D3FEND Techniques:

Timeline of Events

1
January 20, 2026

MicroWorld Technologies detects unauthorized access to a regional update server and distributes the malicious 'Reload.exe' file.

2
January 22, 2026

MicroWorld sends a security advisory to its customers about the incident.

3
January 29, 2026

Security firm Morphisec publicly details the supply chain attack.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Supply Chain AttackeScanAntivirusMalwareReload.exeHOSTS file

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.