MicroWorld Technologies confirmed that attackers breached one of its eScan antivirus regional update servers on January 20, 2026, distributing trojanized updates to customers during approximately a two-hour window. The malicious payload was signed with what appeared to be a legitimate certificate, allowing it to bypass integrity checks.

Incident overview

AttributeDetails
VendorMicroWorld Technologies (eScan)
Incident dateJanuary 20, 2026
Attack typeSupply chain compromise
Exposure window~2 hours
Detection methodInternal monitoring
Response time~1 hour to isolation
System downtime8+ hours for rebuild

Attack architecture

The compromise deployed a three-stage attack designed for persistence and defense evasion:

Stage 1: Initial compromise

ElementDetails
Target fileC:\Program Files (x86)\escan\reload.exe
ActionLegitimate file replaced with trojanized version
SignatureFake digital signature to bypass integrity checks

Stage 2: Persistent downloader

ElementDetails
Dropped fileCONSCTLX.exe
Architecture64-bit executable
CapabilitiesArbitrary PowerShell execution, C2 communications
PersistenceScheduled task and registry modifications

Stage 3: Defense evasion

ElementDetails
TargetWindows hosts file
ActionMap eScan domains to non-routable address
Address used2.3.4.0
EffectPrevents future updates and remediation

The hosts file modification is particularly insidious—it blocks the antivirus from receiving legitimate updates or security team-pushed remediation, forcing manual intervention.

Indicators of compromise

C2 infrastructure

TypeIndicator
Domainvhs.delrosal[.]net
Domaintumama.hns[.]to
Domainblackice.sol-domain[.]org
Domaincodegiant[.]io
Domaincsc.biologii[.]net
Domainairanks.hns[.]to
IP address185.241.208.115

File system indicators

PathIndicator
Log fileC:\ProgramData\euapp.log
Backup/stagingC:\ProgramData\esfsbk
Scheduled taskCorelDefrag

Registry indicators

KeyValue
HKLM\Software\E9F9EEC3-86CA-4EBE-9AA4-1B55EE8D114EMalware presence indicator
HKLM\SOFTWARE\WOW6432Node\MicroWorld\eScan for Windows\ODSWTBases_new = 999

Hosts file modification

CheckDetails
LocationC:\Windows\System32\drivers\etc\hosts
PatterneScan domains mapped to 2.3.4.0

Geographic distribution

Kaspersky telemetry identified hundreds of infected machines, primarily in South Asia:

RegionConcentration
IndiaPrimary
BangladeshSignificant
Sri LankaSignificant
PhilippinesSignificant

MicroWorld disputes the scope, claiming the incident was “limited to a small number of systems in a specific region.”

Conflicting accounts

SourceClaim
Morphisec”Critical supply chain compromise” affecting customers globally
MicroWorld”Limited to small number of systems in specific region”
MorphisecWriteup is accurate
MicroWorldWriteup is “factually inaccurate” on multiple points

Response timeline

TimeAction
January 20, 2026Attack occurs during ~2-hour window
+1 hourMicroWorld detects via internal monitoring
+1 hourAffected infrastructure isolated
+8 hoursGlobal update system offline for rebuild
January 29, 2026Public disclosure

MicroWorld states they rebuilt from clean backups and have released a remediation utility.

This has happened before

This is the second time eScan’s update mechanism has been exploited.

2024 GuptiMiner campaign

AttributeDetails
DiscovererAvast
AttributionNorth Korea-linked Kimsuky
Campaign nameGuptiMiner
Attack typeMan-in-the-middle on update process
Vulnerability ageAt least 5 years before patch
Patch dateJuly 2023
TargetsLarge corporate networks

GuptiMiner technical details

TechniqueDescription
Update interceptionNo HTTPS on update downloads
Package replacementMalware-laced update substituted on the wire
PersistencePNG loader dropped during shutdown events
EvasionAnti-VM and anti-debug tricks
StoragePayloads in Windows Registry
Trust abuseRoot certificate added to Windows store

The earliest identified GuptiMiner sample dates to April 2018, suggesting the vulnerability was exploited for years before discovery.

Architecture concerns

Issue2024 Attack2026 Attack
Update mechanismExploitedExploited
VectorMitM on HTTP updatesServer compromise
DurationYearsHours
Geographic focusCorporate networksSouth Asia

The recurring compromise of the same update channel raises questions about the security architecture of eScan’s distribution infrastructure.

Detection and remediation

Immediate detection steps

StepAction
1Search for scheduled task CorelDefrag
2Check C:\ProgramData\ for euapp.log and esfsbk
3Inspect hosts file for blocked eScan domains
4Query registry for GUID-named keys
5Review network logs for C2 connections

If indicators present

ActionDetails
Assume compromiseSystem should be treated as fully compromised
Isolate systemRemove from network immediately
Contact MicroWorldObtain remediation utility
Forensic analysisDetermine scope of access
Password rotationAny credentials accessible from system

Remediation challenges

ChallengeImpact
Hosts file modificationStandard patching won’t work
Update blockingCan’t push fix remotely
Manual interventionEach system requires individual attention
User awarenessMany users unaware they’re affected

Recommendations

For eScan customers

PriorityAction
ImmediateCheck for IOCs listed above
ImmediateContact MicroWorld support if indicators found
HighVerify hosts file hasn’t been modified
HighEnsure scheduled tasks are legitimate
OngoingMonitor for suspicious activity

For organizations using endpoint AV

PriorityAction
HighEvaluate supply chain security of AV vendors
HighImplement network monitoring for AV infrastructure
MediumConsider defense-in-depth beyond single AV
OngoingMonitor vendor security advisories

For security teams

FocusConsideration
Vendor assessmentHow does the vendor secure their update infrastructure?
Detection coverageCan you detect hosts file modifications?
Update verificationIs there integrity checking beyond signatures?
Incident responseWhat’s the plan if your AV becomes the threat?

Context

Security software supply chain attacks are particularly damaging because:

  1. AV has elevated privileges on endpoint systems
  2. Users trust updates from security vendors
  3. Detection is difficult when the detector is compromised
  4. Remediation is complex when the update channel is blocked

The fact that eScan’s update mechanism has been compromised twice in three years—first via protocol weakness, now via server compromise—suggests fundamental architectural issues that may require more than incremental fixes to address.

Organizations dependent on eScan should weigh whether continued use is appropriate given the demonstrated attack surface of the product’s update infrastructure.