Code Defence Cyber security

eScan Antivirus Suffers Supply-Chain Compromise via Malicious Updates

Summary: MicroWorld Technologies, the maker of eScan antivirus, has suffered a confirmed supply-chain compromise. Check Point Research reports that malicious updates were pushed through the legitimate update servers, effectively using the security software itself to deliver malware to customer endpoints.

Business Impact: High irony and high risk. When the “Doctor” is the one spreading the “Virus,” trust in the security stack evaporates. This is particularly damaging for SMEs who rely on eScan for their primary endpoint protection. It can lead to complete network compromise without any “Alerts” because the malware is running with the antivirus’s high-level privileges.

Why It Happened: Attackers successfully compromised the internal build or distribution environment of MicroWorld, allowing them to inject malicious payloads into signed updates before they reached the end-users.

Recommended Executive Action: If eScan is in your environment, isolate those endpoints from the core network immediately. Revert to a “Clean Boot” or use a secondary, uninfected tool to scan for persistent implants. This is a critical reminder to diversify security vendors at different layers of the stack.

Hashtags: #eScan #Antivirus #SupplyChain #ZeroTrust #EndpointSecurity #MalwareAlert

Scroll to Top

Review My Order

0

Subtotal