Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

0
Medium
Malware
Published: Mon Feb 02 2026 (02/02/2026, 05:47:00 UTC)
Source: The Hacker News

Description

The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent downloader to enterprise and consumer systems. "Malicious updates were distributed through eScan's legitimate update infrastructure, resulting in the deployment of multi-stage malware to enterprise

AI-Powered Analysis

AILast updated: 02/02/2026, 08:47:10 UTC

Technical Analysis

In January 2026, attackers gained unauthorized access to a regional update server within the eScan antivirus update infrastructure, enabling them to distribute malicious updates to both enterprise and consumer endpoints. The compromised update replaced the legitimate reload.exe binary with a rogue version signed with a fake digital signature. This malicious executable, located in the eScan installation directory, executes Base64-encoded PowerShell scripts that perform several malicious actions: disabling eScan’s update mechanism by modifying the HOSTS file, bypassing Windows AMSI to evade detection, and validating the victim environment to avoid infecting systems running security tools or analysis software. Upon passing these checks, the malware downloads and executes additional payloads, including CONSCTLX.exe and a PowerShell-based malware launched via scheduled tasks. The malware maintains persistence by modifying update timestamps to appear legitimate and continuously contacts attacker-controlled servers for further instructions and payloads. The attack was detected and mitigated within hours, with MicroWorld isolating affected servers and releasing patches. Kaspersky telemetry indicates hundreds of infections primarily in India, Bangladesh, Sri Lanka, and the Philippines, but the global distribution of eScan users means the threat could extend to other regions. This supply chain attack is notable for targeting an antivirus product’s update mechanism, a rare and sophisticated vector that undermines trust in security software.

Potential Impact

For European organizations using eScan antivirus, this supply chain compromise poses significant risks. The malware’s ability to disable antivirus updates and evade detection can lead to prolonged undetected infections, allowing attackers to deploy additional payloads that may include espionage tools, ransomware, or data exfiltration malware. The persistence mechanisms and update timestamp manipulations can mislead security teams into believing systems are protected and up to date. Enterprises relying on eScan for endpoint protection may face increased exposure to secondary attacks, potentially impacting confidentiality, integrity, and availability of critical systems. Consumer systems are also at risk, which can lead to broader network infections within organizations or supply chains. The attack’s multi-stage nature and use of PowerShell scripts complicate detection and remediation, requiring coordinated incident response. The disruption of update services and the need for emergency patching can also impact operational continuity. Given the sophistication and stealth of the malware, European organizations must act swiftly to verify their eScan installations and apply vendor-provided fixes to mitigate potential damage.

Mitigation Recommendations

European organizations should immediately verify the integrity of their eScan antivirus installations, focusing on the reload.exe and CONSCTLX.exe binaries in the installation directory. They must apply the official patches released by MicroWorld Technologies to revert malicious changes and restore legitimate update functionality. It is critical to audit the HOSTS file for unauthorized modifications that block update servers and to check scheduled tasks for suspicious PowerShell executions. Organizations should conduct thorough endpoint scans using multiple security tools to detect and remove any remnants of the malware. Network monitoring should be enhanced to detect unusual outbound connections to attacker-controlled servers. Incident response teams should validate that no secondary payloads have been deployed and consider isolating affected systems until remediation is complete. Additionally, organizations should review and tighten access controls around update infrastructure and implement enhanced monitoring for supply chain attack indicators. Engaging with MicroWorld support for comprehensive remediation guidance and threat intelligence updates is recommended. Finally, organizations should educate users about the incident and reinforce best practices for software update verification and endpoint security.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/escan-antivirus-update-servers.html","fetched":true,"fetchedAt":"2026-02-02T08:46:37.940Z","wordCount":1384}

Threat ID: 69806471f9fa50a62f14456f

Added to database: 2/2/2026, 8:46:41 AM

Last enriched: 2/2/2026, 8:47:10 AM

Last updated: 2/6/2026, 11:31:29 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats