When Security Software Becomes the Threat: Dream Flags eScan Compromise
- The MicroWorld Technologies confirmation regarding their eScan antivirus, as referenced in the BLEEPINGCOMPUTER, and HELPNETSECURITY articles.
On January 20th, 2026, Dream’s cyber platform, particularly its Detection product abilities, identified an active compromise of the software supply chain affecting MicroWorld Technologies’ eScan antivirus. Malicious updates were distributed through eScan’s update infrastructure to both consumer and enterprise endpoints.
The campaign was nicknamed Verglas, a wordplay on black ice, and used a trojanized update to replace a legitimate eScan component, initiating a multi-stage infection process. This activity ultimately deployed a remote-access downloader while tampering with the Windows hosts file and eScan registry settings to block future updates and complicate cleanup efforts.
Dream’s Detection autonomously identified and investigated the attack in the wild as it was being leveraged via MicroWorld’s eScan antivirus. The attack was reconstructed as a multi-stage, compromised deployment delivered through MicroWorld eScan’s trusted update channel: victims received a trojanized update that is believed to provide full remote access to infected machines.
Dream recommends that organizations promptly isolate any suspected endpoints to prevent further spread, while preserving relevant evidence to support a complete investigation.
The attack began when a routine eScan update deployed a trojanized component, Reload.exe, which immediately blended into the normal update workflow and launched a fully fileless infection chain. Within minutes, the malware established persistence via a SYSTEM-level scheduled task, staged an obfuscated PowerShell payload in the registry, bypassed AMSI protections in memory, and initiated encrypted command-and-control communications. Subsequent stages fingerprinted hosts, selectively gated execution to avoid analysis environments, and retrieved encrypted payloads using multi-URL failover and kill-switch logic. The final stage deployed a disguised downloader, consctlx.exe, and modified the Windows hosts file and eScan registry settings to block future updates and remediation. Dream’s Detection product autonomously reconstructed this end-to-end workflow in real time, exposing how a legitimate security update channel was weaponized to deliver resilient, stealthy remote access at scale.
The full report can be seen here.
- Treat Verglas as a potential high-impact incident because it abused a trusted software update mechanism.
- As a precaution, Dream recommends that affected organizations contact the vendor for further information, guidance, as well as:
o Engage in qualified incident response services to assess the scope of exposure, determine whether any additional systems or accounts were impacted, and guide containment and remediation.
o As a precaution, affected organizations should review and reset potentially exposed credentials and ensure they can restore affected systems from trusted backups or known-good images.
| # | Type | Details |
| 1. | Registry | HKLM:\Software\E9F9EEC3-86CA-4EBE-9AA4-1B55EE8D114E |
| 2. | Registry | HKLM:\Software\{26B71C-ED81-43E5-9AF-05875B889E9} (Value name: Trello) |
| 3. | Scheduled Task | \Microsoft\Windows\Defrag\CorelDefrag |
| 4. | File Hash | 36ef2ec9ada035c56644f677dab65946798575e1d8b14f1365f22d7c68269860 |
| 5. | File Hash | 386a16926aff225abc31f73e8e040ac0c53fb093e7daf3fbd6903c157d88958c |
| 6. | File Hash | 674943387cc7e0fd18d0d6278e6e4f7a0f3059ee6ef94e0976fae6954ffd40dd |
| 7. | File Hash | bec369597633eac7cc27a698288e4ae8d12bdd9b01946e73a28e1423b17252b1 |
| 8. | File Hash | c2de3b16cc9c0e558cbebec16f4e59171d91b7b50293657f5a07249b50a71fd6 |
| 9. | File Hash | 5f6fcc646a413599a237eb1383dd4e082b007d133041b0c08cda12d3e70c1923 |
| 10. | File Hash | 1944aa7540eb60a7dd11b58f2eb6b9e2b3377668156ed6660adb7f2babb389d2 |
| 11. | File Hash | 021671a9cf17fa1c9b8cda81647d28d88b4acb856736cbbbd990befea7b69c4c |
| 12. | File Hash | 4f6391237571b494e8b5623ed104925097f05b006a34c5fc0e97d2ef6dcb4856 |
| 13. | C2 Network Connections | hxxps://vhs[.]delrosal[.]net/i |
| 14. | C2 Network Connections | hxxps://tumama[.]hns[.]to |
| 15. | C2 Network Connections | hxxps://blackice[.]sol-domain[.]org |
| 16. | C2 Network Connections | hxxps://codegiant[.]io/dd/dd/dd.git/download/main/middleware.ts |
| 17. | Campaign-related Domains | · vhs.delrosal[.]net · so.delrosal[.]net · ib.delrosal[.]net · ia.delrosal[.]net · tumama.hns[.]to · 504e1a42.host.njalla[.]net · zoutube[.]net · go.zoutube[.]net · a.zoutube[.]net · distorit[.]net · go.distorit[.]net · b.distorit[.]net |
| 18. | IP Addresses | · 80.78.26.66 · 143.198.94.96 · 80.97.160.50 · 96.9.125.243 |
| 19. | Content Page Hash | MD5 9674d4d4adf2dd3ae860dce0850111ca |
| 20. | Code Signing Certificate Thumbprint | 76B0D9D51537DA06707AFA97B4AE981ED6D03483 |
| 21. | Cryptography | RC4 key: Y5C5SMXMU2 |
The full report can be seen here.