eScan confirms update server breached to push malicious update
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述。首先,我需要仔细阅读文章,理解主要事件和关键点。 文章讲的是MicroWorld Technologies的eScan杀毒软件的一个更新服务器被入侵了。攻击者利用这个服务器在1月20日分发了一个未经授权的恶意更新,影响了一小部分客户。eScan已经隔离并重建了受影响的基础设施,并且旋转了认证凭证,还为受影响的客户提供了解决方案。 同时,安全公司Morphisec也发布了一份报告,分析了客户终端上的恶意活动,并将这些活动与eScan的更新基础设施联系起来。Morphisec声称他们是在同一天检测到恶意活动,并且联系了eScan。但eScan表示他们自己在同一天通过监控和客户报告发现了问题,并迅速隔离了基础设施,并在第二天发布了安全公告。他们还主动通知了受影响的客户。 文章还提到恶意更新分发了一个修改过的Reload.exe文件,这个文件被用来部署多阶段恶意软件。虽然这个文件看起来像是用eScan的代码签名证书签署的,但实际上签名是无效的。恶意软件修改了系统hosts文件,阻止连接到eScan的更新服务器,并下载了更多的有效载荷。 最后,eScan提供了一个修复更新,帮助客户恢复系统功能,并建议客户阻止特定的命令和控制服务器以增强安全性。 现在我要把这些信息浓缩到100字以内。重点包括:eScan的一个更新服务器被入侵;分发了恶意更新;影响了一小部分客户;eScan采取了措施修复;Morphisec报告了相关活动;以及修复措施。 可能还需要提到恶意软件的行为和影响范围。这样就能全面地涵盖主要事件。 </think> MicroWorld Technologies旗下eScan杀毒软件的一处区域更新服务器遭入侵,导致未经授权的恶意更新于1月20日分发给部分用户。该公司迅速隔离并重建受影响基础设施,并提供修复方案。安全公司Morphisec报告称检测到相关恶意活动并与eScan协调应对。事件未涉及产品漏洞,仅影响使用特定区域集群的用户。 2026-1-28 21:15:30 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

Hacker shhing

MicroWorld Technologies, the maker of the eScan antivirus product, has confirmed that one of its update servers was breached and used to distribute an unauthorized update later analyzed as malicious to a small subset of customers earlier this month.

The file was delivered to customers who downloaded updates from the regional update cluster during a two-hour window on January 20, 2026.

eScan says the affected infrastructure has since been isolated and rebuilt, authentication credentials have been rotated, and remediation has been made available to impacted customers.

Wiz

Security firm Morphisec separately published a technical report analyzing malicious activity observed on customer endpoints, which it associates with updates delivered from eScan's update infrastructure during the same timeframe.

Morphisec states that it detected malicious activity on January 20, 2026, and later contacted eScan. MicroWorld Technologies told BleepingComputer it disputes Morphisec's claims that it was the first to discover or report the incident.

According to eScan, the company detected the issue internally on January 20 through monitoring and customer reports, isolated the affected infrastructure within hours, and issued a security advisory on January 21. eScan says Morphisec contacted the company later, after publishing public claims about the incident.

eScan also disputes claims that affected customers were unaware of the issue, stating that it conducted proactive notifications and direct outreach to impacted customers while remediation was being finalized.

Update infrastructure breached

In its advisory, eScan classified the incident as an update infrastructure access incident, stating that unauthorized access to a regional update server configuration allowed an unauthorized file to be placed in the update distribution path.

"Unauthorized access to one of our regional update server configurations resulted in an incorrect file (patch configuration binary/corrupt update) being placed in the update distribution path," reads an advisory shared with BleepingComputer by MicroWorld Technologies.

"This file was distributed to customers downloading updates from the affected server cluster during a limited timeframe on January 20, 2026."

The company emphasized that the incident did not involve a vulnerability in the eScan product itself.

eScan stressed that only those whose software was updated from the specific regional cluster were impacted, while all other customers remained unaffected.

However, eScan says that those who installed the malicious update may have seen this behavior on their systems:

  • Update service failure notifications
  • Modified system hosts file preventing connection to eScan update servers
  • eScan update configuration file modifications
  • Inability to receive new security definition updates
  • Update unavailability popup on client machines

BleepingComputer contacted eScan with further questions on when its systems were initially breached and will update the story if we receive a reply back.

Update deployed to push malware

Morphisec's security bulletin says that the malicious update pushed down a modified version of an eScan update component, "Reload.exe".

"Malicious updates were distributed through eScan's legitimate update infrastructure, resulting in the deployment of multi-stage malware to enterprise and consumer endpoints globally," reads Morphisec's bulletin.

While the modified Reload.exe is signed with what appears to be eScan's code-signing certificate, both Windows and VirusTotal show the signature as invalid.

According to Morphisec, the Reload.exe file [VirusTotal] was used to enable persistence, execute commands, modify the Windows HOSTS file to prevent remote updates, and connect to the C2 infrastructure to download further payloads.

The researchers say the following command and control servers were observed:

hxxps[://]vhs[.]delrosal[.]net/i
hxxps[://]tumama[.]hns[.]to
hxxps[://]blackice[.]sol-domain[.]org
hxxps[://]codegiant[.]io/dd/dd/dd[.]git/download/main/middleware[.]ts
504e1a42.host.njalla[.]net
185.241.208[.]115

The final payload seen deployed was a file named CONSCTLX.exe [VirusTotal], which Morphisec acts as a backdoor and a persistent downloader. Morphisec says that the malicious files created scheduled tasks for persistence using names like "CorelDefrag".

eScan has created a remediation update that customers can run to perform the following actions:

  • Automatically identifies and corrects incorrect modifications
  • Re-enables proper eScan update functionality
  • Verifies successful restoration
  • Requires standard system restart

Both eScan and Morphisec recommend that customers block the above command and control servers for additional security.

In 2024, North Korean hackers were observed exploiting the updating mechanism of eScan antivirus to plant backdoors on corporate networks.

Wiz

Secrets Security Cheat Sheet: From Sprawl to Control

Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

Get the cheat sheet and take the guesswork out of secrets management.


文章来源: https://www.bleepingcomputer.com/news/security/escan-confirms-update-server-breached-to-push-malicious-update/
如有侵权请联系:admin#unsafe.sh