Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

eScan Antivirus Delivers Malware in Supply Chain Attack

Posted on January 31, 2026January 31, 2026 By CWS

eScan antivirus customers have been contaminated with malware final week after hackers compromised an official replace server, safety researchers report.

The eScan provide chain assault got here to mild on January 29, when cybersecurity agency Morphisec revealed a risk bulletin warning of rogue updates tampering with customers’ techniques.

“Malicious updates have been distributed via eScan’s reputable replace infrastructure, ensuing within the deployment of multi-stage malware to enterprise and client endpoints globally,” Morphisec’s bulletin reads.

In line with the safety agency, the updates modified customers’ units in order that they might be lower off from eScan’s updates. The antivirus’s regular performance was additionally altered, it says.

The affected customers acquired a malicious ‘Reload.exe’ file, designed to kick off a multi-stage an infection chain. The file modified the HOSTS file to dam automated updates, established persistence via scheduled duties, and downloaded extra payloads.

“Computerized remediation is subsequently not attainable for compromised techniques. Impacted organizations and people should proactively contact eScan to acquire the handbook replace/patch,” Morphisec says.Commercial. Scroll to proceed studying.

Morphisec mentioned it reported the incident to MicroWorld Applied sciences, the corporate behind eScan, on January 21, at some point after it detected the malicious habits on its prospects’ units.

eScan knowledgeable Morphisec that it had detected unauthorized entry to its infrastructure on January 20 and instantly remoted the impacted replace servers, which remained offline for over eight hours.

To resolve the problem, eScan launched a utility that customers can receive by contacting the corporate’s technical help staff. The device was designed to wash the an infection, roll again malicious system modifications, and restore eScan’s regular performance.

eScan downplays influence, cries foul play

Whereas the assault and the aftermath appear somewhat easy, eScan’s response to the general public disclosure of the incident is a unique story.

Because it seems, the Indian antivirus supplier was not proud of Morphisec’s evaluation of how the incident unfolded, nor with the “provide chain assault” stamp slapped on it.

The corporate, nonetheless, did affirm the unauthorized entry to its infrastructure. In reality, it disclosed it to its prospects in a January 22 safety advisory, which states that the incident impacted a regional replace server.

“Unauthorized entry to one in all our regional replace server configurations resulted in an incorrect file (patch configuration binary/corrupt replace) being positioned within the replace distribution path. This file was distributed to prospects downloading updates from the affected server cluster throughout a restricted timeframe on January 20, 2026,” the advisory reads.

The advisory’s description of the system habits triggered by the malicious replace overlaps with Morphisec’s description. Moreover, eScan notes that the incident had a medium-high influence on enterprise prospects, which inserts Morphisec’s evaluation.

Regardless, eScan is sad with Morphisec’s reporting on the incident, which it reportedly sees as inaccurate. In reality, the antivirus firm is seemingly working with authorized counsel on the matter.

SecurityWeek has emailed eScan for a press release on the incident and can replace this text if the corporate responds.

Associated: ‘PackageGate’ Flaws Open JavaScript Ecosystem to Provide Chain Assaults

Associated: Notepad++ Patches Updater Flaw After Studies of Site visitors Hijacking

Associated: Fintech Agency Wealthsimple Says Provide Chain Assault Resulted in Knowledge Breach

Associated: AI Provide Chain Assault Methodology Demonstrated Towards Google, Microsoft Merchandise

Security Week News Tags:Antivirus, Attack, Chain, Delivers, eScan, Malware, Supply

Post navigation

Previous Post: Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

Related Posts

Law Firms Warned of Silent Ransom Group Attacks Security Week News
Qantas Hit with Extortion Demand After Data Breach Security Week News
Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025 Security Week News
Seemplicity Raises $50 Million for Exposure Management Platform Security Week News
Nikkei Says 17,000 Impacted by Data Breach Stemming From Slack Account Hack Security Week News
Australia Enforces Ransomware Payment Reporting Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • eScan Antivirus Delivers Malware in Supply Chain Attack
  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Automated Penetration Testing Toolkit Designed for Linux systems
  • SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations
  • Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • eScan Antivirus Delivers Malware in Supply Chain Attack
  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Automated Penetration Testing Toolkit Designed for Linux systems
  • SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations
  • Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark