Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Android developer verification rollout begins ahead of September enforcement

Whoop’s valuation triples to $10 billion

TrueConf zero-day exploited to attack Southeast Asian government networks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » TrueConf zero-day exploited to attack Southeast Asian government networks
Identity

TrueConf zero-day exploited to attack Southeast Asian government networks

By March 31, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 31, 2026Zero-day/vulnerabilities

TrueConf Zero Day

A high-severity security flaw in TrueConf client video conferencing software was exploited as a zero-day as part of a campaign targeting government agencies in Southeast Asia called TrueChaos.

The vulnerability in question, CVE-2026-3502 (CVSS score: 7.8), is a lack of integrity checks when retrieving application update code, which could allow an attacker to distribute a modified update that could result in arbitrary code execution. The TrueConf Windows client has been patched since version 8.5.3 released earlier this month.

“This flaw results from the exploitation of TrueConf’s updater validation mechanism, allowing an attacker with control of an on-premises TrueConf server to distribute and execute arbitrary files to all connected endpoints,” Check Point said in a report published today.

This means that an attacker who gains control of an on-premises TrueConf server could replace the update package with a poisoned version, which would then be pulled by a client application installed on a customer’s endpoint, since proper validation is not enforced to ensure that server-provided updates have not been tampered with.

It was discovered that the TrueChaos campaign could be armed with this flaw in the update mechanism to deploy the open-source Havoc command and control (C2) framework to vulnerable endpoints. This activity is believed with moderate confidence to be the work of a Chinese-linked actor.

Attacks exploiting this vulnerability were first recorded by a cybersecurity firm in early 2026. The implicit trust that the client places in the update mechanism is weaponized to push a malicious installer that leverages DLL sideloading to launch a DLL backdoor.

TrueConf Zero Day

The DLL implant (‘7z-x64.dll’) has also been observed performing reconnaissance, setting persistence, and performing keyboard operations to retrieve an additional payload (‘iscsiexe.dll’) from the FTP server (‘47.237.15’).[.]The main purpose of ‘iscsiexe.dll’ is to ensure the execution of a benign binary (‘poweriso.exe’) that is dropped to sideload the backdoor.

The exact final stage of malware delivered as part of the attack is not clear, but the final goal is believed to be to deploy the Havoc implant.

The relationship between TrueChaos and China-linked attackers is based on observed tactics such as DLL sideloading, Alibaba Cloud, use of Tencent in C2 infrastructure, and the fact that the same victims were targeted within the same time period by ShadowPad, an advanced backdoor widely used by China-linked hacker groups.

In addition, the use of Havoc is believed to be by another Chinese threat actor called Amaranth-Dragon in intrusions targeting governments and law enforcement agencies across Southeast Asia in 2025.

“The exploitation of CVE-2026-3502 did not require the attacker to compromise each endpoint individually,” Check Point said. “Instead, the attackers exploited the trust relationship between a central on-premises TrueConf server and its clients. By replacing legitimate updates with malicious updates, the attackers turned the product’s normal update flow into a malware distribution channel across multiple connected government networks.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHealthcare data giant CareCloud announces that hackers have accessed patient medical records
Next Article Whoop’s valuation triples to $10 billion

Related Posts

Android developer verification rollout begins ahead of September enforcement

March 31, 2026

Vertex AI vulnerability exposes Google Cloud data and private artifacts

March 31, 2026

Silver Fox uses AtlasCross RAT and fake domains to scale Asian cyber campaign

March 31, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Android developer verification rollout begins ahead of September enforcement

Whoop’s valuation triples to $10 billion

TrueConf zero-day exploited to attack Southeast Asian government networks

Healthcare data giant CareCloud announces that hackers have accessed patient medical records

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.