TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Entities
Tracked as CVE-2026-3502 with a CVSS score of 7.8, the flaw has been weaponized in a campaign dubbed “Operation TrueChaos.”
Attackers are abusing the application’s trusted update mechanism to silently deliver the Havoc post-exploitation framework to vulnerable machines, all without triggering user suspicion.
TrueConf is a widely deployed video conferencing platform used by government agencies, military organizations, and critical infrastructure operators.
Its key selling point is the ability to operate entirely within private, air-gapped local networks, no internet required, making it a trusted choice for sensitive environments.
However, researchers discovered a serious flaw in the TrueConf client’s software update handling.
Each time the application launches, it contacts the on-premises server to check for a newer version.
If one exists, the client automatically downloads and installs it. The critical problem: this update process performs no authenticity checks and no file integrity verification.
Any attacker who controls the central TrueConf server can silently replace the legitimate update with a malicious payload, and every connected client will execute it without question.
In observed attacks, threat actors compromised a government IT department’s central TrueConf server, a single point of failure connected to dozens of government agencies.
By swapping the legitimate update package with a weaponized one, they infected all connected endpoints simultaneously, bypassing the need to compromise each machine individually.
The malicious update appeared normal to users but dropped two hidden files in the background: a legitimate-looking executable named poweriso.exe and a malicious library called 7z-x64.dll.
The attack then unfolded in stages:
Based on the tactics, techniques, and the cloud hosting infrastructure used, Check Point researchers assess with moderate confidence that a Chinese-nexus threat actor is behind Operation TrueChaos.
TrueConf has released version 8.5.3 to address the vulnerability. Organizations must apply this patch immediately.
Defenders should hunt for the following indicators of compromise:
ProgramData folders43.134.90[.]60, 43.134.52[.]221, 47.237.15[.]197| Artifact | Hash / IP |
|---|---|
| trueconf_windows_update.exe | 22e32bcf113326e366ac480b077067cf |
| iscsiexe.dll | 9b435ad985b733b64a6d5f39080f4ae0 |
| 7z-x64.dll (Havoc implant) | 248a4d7d4c48478dcbeade8f7dba80b3 |
| Havoc C2 | 43.134.90[.]60 |
| Havoc C2 | 43.134.52[.]221 |
| Havoc C2 | 47.237.15[.]197 |
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Entities appeared first on Cyber Security News.
DETROIT — An urgent investigation is underway in Detroit after multiple students were hospitalized this…
LANSING, Mich. — A major budget standoff is now underway in Michigan after state Senate…
STARKE COUNTY, IND. (WOWO) A former employee of the Starke County Sheriff’s Department has pleaded…
The status of New Hampshire’s end to mandatory car inspections might still be murky in…
Five major dairy farms populated the half-mile stretch of Upper City Road in Pittsfield where…
Resident Evil Requiem players were sad to see the Merchant left out of Leon's latest…
This website uses cookies.