Combine cutting-edge XDR technology, multi-signal threat intelligence and 24/7 Elite Threat Hunters to help you build a world-class security operation.
Get unlimited Incident Response with threat suppression guarantee - anytime, anywhere.
CTEM and advisory programs that identify security gaps and build proactive strategies to address them.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
XDR with machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Seamless integration and threat investigation across your existing tech stack.
Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Extend your team capabilities and prevent business disruption with expertise from eSentire.
We balance automated blocks with rapid human-led investigations to manage threats.
Flexible MDR pricing and packages that fit your unique security requirements.
Entry level foundational MDR coverage
Comprehensive Next Level MDR from eSentire
Next Level MDR with Cyber Risk Advisors to continuously advance your security program
Stop ransomware before it spreads.
Meet regulatory compliance mandates.
Detect and respond to zero-day exploits.
End misconfigurations and policy violations.
Defend third-party and supply chain risk.
Prevent disruption by outsourcing MDR.
Adopt a risk-based security approach.
Meet insurability requirements with MDR.
Protect your most sensitive data.
Build a proven security program.
Operationalize timely, accurate, and actionable cyber threat intelligence.
THE THREAT On May 13th, Ivanti disclosed two zero-day vulnerabilities, CVE-2025-4427 and CVE-2025-4428, impacting Ivanti Endpoint Manager Mobile (EPMM). Ivanti confirmed that…
Apr 25, 2025THE THREAT On April 24th, SAP disclosed a maximum severity vulnerability impacting SAP NetWeaver systems. The vulnerability was initially reported to SAP by researchers from…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
We offer three flexible MDR pricing packages that can be customized to your unique needs.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
Law enforcement agencies recently dismantled avcheck[.]net through Operation Endgame, a major international effort targeting cybercrime infrastructure. This platform was known for helping cybercriminals test their concealed malware against antivirus systems to ensure it would go undetected.
With AvCheck now offline, eSentire's Threat Response Unit (TRU) has observed cybercriminals shifting to alternative platforms like scanner[.]to, kleenScan[.]com, and avscanner[.]org, which offer similar capabilities for testing malware against multiple antivirus engines.
Cybercriminals who provide or use "crypting" services - where malware is specially encoded or "packed" to avoid detection before being distributed to victim machines typically follow a systematic testing process:
1. They begin by using a crypter to pack (or disguise) their original but detectable malware
2. The newly packed malware is then uploaded to scanning services to test against antivirus (AV) and endpoint detection and response (EDR) systems
3. Based on the scan results, they either:
This cycle continues until the threat actors achieve their desired level of evasion. The figure below illustrates this systematic process.
Services like KleenScan provide cybercriminals with a user-friendly interface for uploading their packed malware, which is then tested against several antivirus engines.
Shown in the figure below, the platform prominently displays "No Distribution" in red text, assuring users that their malware samples won't be shared with antivirus vendors - a practice that would increase detection rates of their malicious payloads.
This practice is what separates illegitimate scanning services from legitimate scanning services like VirusTotal.
On May 14th, 2025, just days before AvCheck's shutdown, a user named "kleenscan" posted a promotional advertisement on a hacking forum marketing the service. This activity demonstrates how scanning services explicitly market their services to cybercriminals on hacking forums.
The interconnected nature of scanning services and the crypting ecosystem is demonstrated by cybercriminals who showcase their effectiveness using scanner results.
The figure below for example displays a threat actor selling a crypter product and using results from KleenScan to demonstrate that only 1/40 antivirus engines detected the payload.
The following table is a list of alternatives actively being used by cybercriminals following the disruption of AvCheck:
Domain Name |
kleenscan[.]com |
scanner[.]to |
avscanner[.]org |
av-sense[.]net |
redcheck[.]cc |
The recent disruption of AvCheck through Operation Endgame offers a look into the operational dependencies of cybercriminals. While law enforcement’s intervention marked a significant win, it also highlighted how adaptable threat actors are when faced with sudden infrastructure loss. This adaptability reflects not only the decentralization of cybercrime tools but also the commoditization of malware development workflows.
According to eSentire’s Threat Response Unit (TRU), here’s how these changes reflect broader patterns of behavior for threat actors and the tools they continue to use:
By mimicking legitimate multi-engine antivirus scanning services while removing ethical guardrails like detection reporting or data sharing – these services reinforce a cycle of rapid iteration and persistent evasion.
The eSentire Threat Response Unit (TRU) is an industry-leading threat research team committed to helping your organization become more resilient. TRU is an elite team of threat hunters and researchers that supports our 24/7 Security Operations Centers (SOCs), builds threat detection models across the eSentire XDR Cloud Platform, and works as an extension of your security team to continuously improve our Managed Detection and Response service. By providing complete visibility across your attack surface and performing global threat sweeps and proactive hypothesis-driven threat hunts augmented by original threat research, we are laser-focused on defending your organization against known and unknown threats.