Attackers breached eScan antivirus update infrastructure to push malicious updates, deploying persistent malware on ...
The eScan supply chain attack resulted in malware infections after hackers compromised an update server and pushed a malicious file.
North Korean hackers have been exploiting the updating mechanism of the eScan antivirus to plant backdoors on big corporate networks and deliver cryptocurrency miners through GuptiMiner malware.
MicroWorld Technologies, the maker of the eScan antivirus product, has confirmed that one of its update servers was breached and used to distribute an unauthorized update later analyzed as malicious ...
Hackers abused an antivirus service for five years in order to infect end users with malware. The attack worked because the service delivered updates over HTTP, a protocol vulnerable to attacks that ...
Users report issues with eScan antivirus Internal investigation found threat actor infiltrated systems Update servers were used to send out malware, so users warned to be on their guard Popular ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results