Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
    Cybersecurity

    TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

    adminBy adminApril 1, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    TrueConf Zero-Day
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananMar 31, 2026Zero-Day / Vulnerability

    TrueConf Zero-Day

    A high-severity security flaw in the TrueConf client video conferencing software has been exploited in the wild as a zero-day as part of a campaign targeting government entities in Southeast Asia dubbed TrueChaos.

    The vulnerability in question is CVE-2026-3502 (CVSS score: 7.8), a lack of integrity check when fetching application update code, allowing an attacker to distribute a tampered update, resulting in the execution of arbitrary code. It has been patched in the TrueConf Windows client starting with version 8.5.3, released earlier this month.

    “The flaw stems from the abuse of TrueConf’s updater validation mechanism, allowing an attacker who controls the on-premises TrueConf server to distribute and execute arbitrary files across all connected endpoints,” Check Point said in a report published today.

    In other words, an attacker who manages to gain control of the on-premises TrueConf server can substitute the update package with a poisoned version, which then gets pulled by the client application installed on customers’ endpoints, owing to the fact that it does not enforce adequate validation to ensure that the server-provided update has not been tampered with.

    The TrueChaos campaign has been found to weaponize this flaw in the update mechanism to likely deploy the open-source Havoc command-and-control (C2) framework to vulnerable endpoints. The activity has been attributed with moderate confidence to a Chinese-nexus threat actor.

    Attacks exploiting the vulnerability were first recorded by the cybersecurity company at the beginning of 2026, with the implicit trust the client places in the update mechanism being weaponized to push a rogue installer that, in turn, leverages DLL side-loading to launch a DLL backdoor.

    TrueConf Zero-Day

    The DLL implant (“7z-x64.dll”) has also been observed performing hands-on-keyboard actions to conduct reconnaissance, set up persistence, and retrieve additional payloads (“iscsiexe.dll”) from an FTP server (“47.237.15[.]197”). The primary objective of “iscsiexe.dll” is to ensure the execution of a benign binary (“poweriso.exe”) that’s dropped to sideload the backdoor.

    Although the exact final-stage malware delivered as part of the attack is not clear, it’s assessed with high confidence that the end goal is to deploy the Havoc implant.

    TrueChaos’ links to a Chinese-nexus threat actor are based on the observed tactics, such as the use of DLL side-loading, Alibaba Cloud, and Tencent for C2 infrastructure, and the fact that the same victim was targeted within the same time frame by ShadowPad, a sophisticated backdoor widely used by China-linked hacking groups.

    On top of that, the use of Havoc has been attributed to another Chinese threat actor called Amaranth-Dragon in intrusions aimed at government and law enforcement agencies across Southeast Asia in 2025.

    “The exploitation of CVE-2026-3502 did not require the attacker to compromise each endpoint individually,” Check Point said. “Instead, the attacker abused the trusted relationship between a central on-premises TrueConf server and its clients. By replacing a legitimate update with a malicious one, they turned the product’s normal update flow into a malware distribution channel across multiple connected government networks.”

    Asian attacks Exploited Government networks Southeast TrueConf ZeroDay
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article‘You’ve tarnished Apple’s reputation’: 11 things Apple got horribly wrong over the past 50 years
    Next Article CMF Headphone Pro is already one of the best values in audio, and it’s another 32% OFF
    admin
    • Website

    Related Posts

    NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

    April 16, 2026

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026

    GitHub lays out copyright liability changes and upcoming DMCA review for developers

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

    April 16, 2026

    Google AI director outlines new content playbook

    April 16, 2026

    This 55-Inch LG OLED TV Is Nearly Half Off Right Now

    April 16, 2026

    4 reasons I use a 19-year-old app to copy and move files in Windows

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,343)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (823)
    • Tech Tools & Mobile / Apps (1,606)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

    April 16, 2026

    Google AI director outlines new content playbook

    April 16, 2026

    This 55-Inch LG OLED TV Is Nearly Half Off Right Now

    April 16, 2026
    Most Popular
    • NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software
    • Google AI director outlines new content playbook
    • This 55-Inch LG OLED TV Is Nearly Half Off Right Now
    • 4 reasons I use a 19-year-old app to copy and move files in Windows
    • UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign
    • Why Your Search Data Doesn’t Agree (And What To Do About It)
    • Opera’s browsers just picked up a new AI feature that’s actually useful
    • GitHub lays out copyright liability changes and upcoming DMCA review for developers
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.