AUTO-UPDATED

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

A high-severity zero-day vulnerability in TrueConf video conferencing software, tracked as CVE-2026-3502, is being exploited by Chinese-nexus threat actors to compromise government networks across Southeast Asia.

Key points

  • The vulnerability, CVE-2026-3502, allows attackers to distribute malicious updates by bypassing integrity checks in the TrueConf Windows client.
  • Security researchers at Check Point identified the "TrueChaos" campaign, which uses the flaw to deploy the Havoc command-and-control framework.
  • Attackers gain control of on-premises TrueConf servers to push rogue installers that execute DLL side-loading attacks on connected endpoints.
  • TrueConf released a patch for the flaw in version 8.5.3, which users are urged to install immediately to prevent unauthorized code execution.
  • Attribution links the campaign to Chinese-nexus actors based on infrastructure usage and tactical similarities to previous operations like Amaranth-Dragon.
Why it matters

This exploit demonstrates the significant risk posed by supply chain attacks that weaponize trusted software update mechanisms to bypass individual endpoint security. By compromising a central server, attackers can efficiently infiltrate entire government networks without needing to target each device separately.

Internet Published by info@thehackernews.com (The Hacker News)
Read original