Article Details
Scrape Timestamp (UTC): 2026-01-28 21:03:06.478
Original Article Text
Click to Toggle View
eScan confirms update server breached to push malicious update. MicroWorld Technologies, the maker of the eScan antivirus product, has confirmed that one of its update servers was breached and used to distribute an unauthorized update later analyzed as malicious to a small subset of customers earlier this month. The file was delivered to customers who downloaded updates from the regional update cluster during a two-hour window on January 20, 2026. eScan says the affected infrastructure has since been isolated and rebuilt, authentication credentials have been rotated, and remediation has been made available to impacted customers. Security firm Morphisec separately published a technical report analyzing malicious activity observed on customer endpoints, which it associates with updates delivered from eScan's update infrastructure during the same timeframe. Morphisec states that it detected malicious activity on January 20, 2026, and later contacted eScan. MicroWorld Technologies told BleepingComputer it disputes Morphisec's claims that it was the first to discover or report the incident. According to eScan, the company detected the issue internally on January 20 through monitoring and customer reports, isolated the affected infrastructure within hours, and issued a security advisory on January 21. eScan says Morphisec contacted the company later, after publishing public claims about the incident. eScan also disputes claims that affected customers were unaware of the issue, stating that it conducted proactive notifications and direct outreach to impacted customers while remediation was being finalized. Update infrastructure breached In its advisory, eScan classified the incident as an update infrastructure access incident, stating that unauthorized access to a regional update server configuration allowed an unauthorized file to be placed in the update distribution path. "Unauthorized access to one of our regional update server configurations resulted in an incorrect file (patch configuration binary/corrupt update) being placed in the update distribution path," reads an advisory shared with BleepingComputer by MicroWorld Technologies. "This file was distributed to customers downloading updates from the affected server cluster during a limited timeframe on January 20, 2026." The company emphasized that the incident did not involve a vulnerability in the eScan product itself. eScan stressed that only those whose software was updated from the specific regional cluster were impacted, while all other customers remained unaffected. However, eScan says that those who installed the malicious update may have seen this behavior on their systems: BleepingComputer contacted eScan with further questions on when its systems were initially breached and will update the story if we receive a reply back. Update deployed to push malware Morphisec's security bulletin says that the malicious update pushed down a modified version of an eScan update component, "Reload.exe". "Malicious updates were distributed through eScan's legitimate update infrastructure, resulting in the deployment of multi-stage malware to enterprise and consumer endpoints globally," reads Morphisec's bulletin. While the modified Reload.exe is signed with what appears to be eScan's code-signing certificate, both Windows and VirusTotal show the signature as invalid. According to Morphisec, the Reload.exe file [VirusTotal] was used to enable persistence, execute commands, modify the Windows HOSTS file to prevent remote updates, and connect to the C2 infrastructure to download further payloads. The researchers say the following command and control servers were observed: The final payload seen deployed was a file named CONSCTLX.exe [VirusTotal], which Morphisec acts as a backdoor and a persistent downloader. Morphisec says that the malicious files created scheduled tasks for persistence using names like "CorelDefrag". eScan has created a remediation update that customers can run to perform the following actions: Both eScan and Morphisec recommend that customers block the above command and control servers for additional security. In 2024, North Korean hackers were observed exploiting the updating mechanism of eScan antivirus to plant backdoors on corporate networks. 7 Security Best Practices for MCP As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe. This free cheat sheet outlines 7 best practices you can start using today.
Daily Brief Summary
MicroWorld Technologies confirmed a breach of its eScan antivirus update server, resulting in a malicious update being distributed to a subset of customers on January 20, 2026.
The breach involved unauthorized access to a regional update server, leading to a corrupted file being placed in the update distribution path for two hours.
eScan has isolated and rebuilt the affected infrastructure, rotated authentication credentials, and provided remediation to impacted customers.
Security firm Morphisec reported detecting malicious activity linked to the update, involving a modified "Reload.exe" file used to deploy multi-stage malware.
The malicious update utilized eScan's legitimate infrastructure, with the altered file signed by an invalid code-signing certificate, enabling persistence and command execution.
eScan disputes Morphisec's claims of being the first to discover the breach, asserting internal detection and customer notifications were conducted promptly.
Both eScan and Morphisec recommend blocking identified command and control servers to enhance security and prevent further malicious activity.
The incident highlights the importance of securing update infrastructures to prevent unauthorized access and potential exploitation by threat actors.