Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»eScan Antivirus Supply Chain Breach Delivers Signed Malware
Cyber Security

eScan Antivirus Supply Chain Breach Delivers Signed Malware

Team-CWDBy Team-CWDJanuary 26, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A critical supply chain compromise affecting MicroWorld Technologies’ eScan antivirus product was identified on January 20 2026, after malicious updates were reportedly delivered through the vendor’s legitimate update infrastructure.

The incident led to the global distribution of multi-stage malware to enterprise and consumer endpoints, according to findings published today from Morphisec Threat Labs.

The malicious packages were allegedly digitally signed using a compromised eScan certificate, allowing them to appear legitimate and bypass standard trust mechanisms. Once deployed, the malware established persistence, enabled remote access capabilities and actively prevented affected systems from receiving further updates.

Multi-Stage Malware Blocks Automatic Remediation

The attack chain began with a trojanized version of a 32-bit eScan executable, which replaced a legitimate component during the update process. This initial stage dropped additional payloads, including a downloader and a 64-bit backdoor that provided full remote access to compromised systems.

One of the most significant aspects of the campaign was its built-in anti-remediation capability. The malware modified the Windows hosts file and altered eScan registry settings to block connections to eScan update servers. As a result, compromised endpoints cannot receive automatic fixes or patches.

Read more on supply chain security: Supply Chain Breaches Impact Almost All Firms Globally, BlueVoyant Reveals

Persistence was achieved through scheduled tasks disguised as Windows defragmentation jobs, as well as registry keys using randomly generated GUID names. The downloader component also attempted to communicate with external command-and-control (C2) infrastructure to retrieve additional payloads, though the current status of those servers remains unconfirmed.

Detection, Response and Required Actions

Morphisec said it detected and blocked the malicious activity on protected customer systems within hours of the initial distribution.

The company allegedly contacted MicroWorld Technologies the same day. eScan stated it identified the issue through internal monitoring, isolated the affected infrastructure within one hour and took its global update system offline for more than eight hours.

Despite these steps, Morphisec reported that its customers were required to proactively contact eScan to receive remediation, even though the vendor indicated that customers were being notified directly by phone.

Infosecurity has contacted eScan for comment, but no response has been received at the time of writing.

In the meantime, Morphisec advised organizations running eScan to take immediate action, including:

  • Searching endpoints for known malicious file hashes

  • Reviewing scheduled tasks under WindowsDefrag for suspicious entries

  • Inspecting registry keys with GUID-based names containing encoded data

  • Blocking identified C2 domains

  • Revoking trust in the compromised eScan code-signing certificate

For unprotected systems, the company recommends assuming compromise, isolating affected machines and conducting full forensic investigations. As of publication, no public vendor advisory has been issued and the investigation reportedly remains active.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCISA Releases List of Post-Quantum Cryptography Product Categories
Next Article CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Look out for phony verification pages spreading malware

September 14, 2025

In memoriam: David Harley

November 12, 2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.