By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
Computing

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

News Room
Last updated: 2026/03/31 at 1:04 PM
News Room Published 31 March 2026
Share
TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
SHARE

Ravie LakshmananMar 31, 2026Zero-Day / Vulnerability

A high-severity security flaw in the TrueConf client video conferencing software has been exploited in the wild as a zero-day as part of a campaign targeting government entities in Southeast Asia dubbed TrueChaos.

The vulnerability in question is CVE-2026-3502 (CVSS score: 7.8), a lack of integrity check when fetching application update code, allowing an attacker to distribute a tampered update, resulting in the execution of arbitrary code. It has been patched in the TrueConf Windows client starting with version 8.5.3, released earlier this month.

“The flaw stems from the abuse of TrueConf’s updater validation mechanism, allowing an attacker who controls the on-premises TrueConf server to distribute and execute arbitrary files across all connected endpoints,” Check Point said in a report published today.

In other words, an attacker who manages to gain control of the on-premises TrueConf server can substitute the update package with a poisoned version, which then gets pulled by the client application installed on customers’ endpoints, owing to the fact that it does not enforce adequate validation to ensure that the server-provided update has not been tampered with.

The TrueChaos campaign has been found to weaponize this flaw in the update mechanism to likely deploy the open-source Havoc command-and-control (C2) framework to vulnerable endpoints. The activity has been attributed with moderate confidence to a Chinese-nexus threat actor.

Attacks exploiting the vulnerability were first recorded by the cybersecurity company at the beginning of 2026, with the implicit trust the client places in the update mechanism being weaponized to push a rogue installer that, in turn, leverages DLL side-loading to launch a DLL backdoor.

TrueConf Zero-Day

The DLL implant (“7z-x64.dll”) has also been observed performing hands-on-keyboard actions to conduct reconnaissance, set up persistence, and retrieve additional payloads (“iscsiexe.dll”) from an FTP server (“47.237.15[.]197”). The primary objective of “iscsiexe.dll” is to ensure the execution of a benign binary (“poweriso.exe”) that’s dropped to sideload the backdoor.

Although the exact final-stage malware delivered as part of the attack is not clear, it’s assessed with high confidence that the end goal is to deploy the Havoc implant.

TrueChaos’ links to a Chinese-nexus threat actor are based on the observed tactics, such as the use of DLL side-loading, Alibaba Cloud, and Tencent for C2 infrastructure, and the fact that the same victim was targeted within the same time frame by ShadowPad, a sophisticated backdoor widely used by China-linked hacking groups.

On top of that, the use of Havoc has been attributed to another Chinese threat actor called Amaranth-Dragon in intrusions aimed at government and law enforcement agencies across Southeast Asia in 2025.

“The exploitation of CVE-2026-3502 did not require the attacker to compromise each endpoint individually,” Check Point said. “Instead, the attacker abused the trusted relationship between a central on-premises TrueConf server and its clients. By replacing a legitimate update with a malicious one, they turned the product’s normal update flow into a malware distribution channel across multiple connected government networks.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Sony’s WH-1000XM5 headphones are a whopping 39 percent off Sony’s WH-1000XM5 headphones are a whopping 39 percent off
Next Article Including online games in social media bans is unworkable, unnecessary and would harm young people Including online games in social media bans is unworkable, unnecessary and would harm young people
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

New Rust-Based BUS1 In-Kernel IPC In Development For The Linux Kernel
New Rust-Based BUS1 In-Kernel IPC In Development For The Linux Kernel
Computing
Scientists create world’s fastest ‘underwater supercar’ – and it’s only £4,300,
Scientists create world’s fastest ‘underwater supercar’ – and it’s only £4,300,
News
Five takeaways for US policymakers about China’s new five-year development plan
Five takeaways for US policymakers about China’s new five-year development plan
News
Sony raises prices of China-market PS5 lineup by up to 0 · TechNode
Sony raises prices of China-market PS5 lineup by up to $100 · TechNode
Computing

You Might also Like

New Rust-Based BUS1 In-Kernel IPC In Development For The Linux Kernel
Computing

New Rust-Based BUS1 In-Kernel IPC In Development For The Linux Kernel

2 Min Read
Sony raises prices of China-market PS5 lineup by up to 0 · TechNode
Computing

Sony raises prices of China-market PS5 lineup by up to $100 · TechNode

1 Min Read
How Milsat mapped Nigeria in just nine months
Computing

How Milsat mapped Nigeria in just nine months

11 Min Read

Pinterest Creator Content: Why Value Grows Over Time

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?