TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是TrueConf客户端视频会议软件的一个高危安全漏洞被利用了。这个漏洞被当作零日漏洞用于针对东南亚政府机构的攻击活动,称为TrueChaos。漏洞是CVE-2026-3502,CVSS评分7.8,问题是没有完整性检查,导致攻击者可以分发篡改的更新,执行任意代码。已经修复了,在8.5.3版本中。 攻击者控制了内部TrueConf服务器,替换更新包,客户端没有验证就下载了恶意文件。这个活动利用了更新机制的漏洞,部署了Havoc框架。攻击者可能来自中国,因为使用了DLL侧加载、阿里云、腾讯云等基础设施,并且之前有类似的ShadowPad活动。 总结的时候要包括:软件名称、漏洞细节、攻击目标、影响范围、修复情况以及攻击者的背景。控制在100字以内。 所以,我需要把这些要点浓缩成一句话或者两句话。确保涵盖所有关键信息:TrueConf软件存在高危漏洞CVE-2026-3502,被用于针对东南亚政府机构的TrueChaos活动,攻击者通过篡改更新分发恶意代码,已修复。该活动可能由中国背景的威胁行为者实施。 </think> TrueConf视频会议软件存在高危漏洞CVE-2026-3502(CVSS评分7.8),被用于针对东南亚政府机构的TrueChaos网络攻击活动。该漏洞源于更新机制缺乏完整性验证,允许攻击者分发恶意更新并执行任意代码。此漏洞已被修复(版本8.5.3)。该活动被认为与中国背景的威胁行为者有关,并利用Havoc框架进行攻击。 2026-3-31 16:3:0 Author: thehackernews.com(查看原文) 阅读量:2 收藏

TrueConf Zero-Day

A high-severity security flaw in the TrueConf client video conferencing software has been exploited in the wild as a zero-day as part of a campaign targeting government entities in Southeast Asia dubbed TrueChaos.

The vulnerability in question is CVE-2026-3502 (CVSS score: 7.8), a lack of integrity check when fetching application update code, allowing an attacker to distribute a tampered update, resulting in the execution of arbitrary code. It has been patched in the TrueConf Windows client starting with version 8.5.3, released earlier this month.

"The flaw stems from the abuse of TrueConf's updater validation mechanism, allowing an attacker who controls the on-premises TrueConf server to distribute and execute arbitrary files across all connected endpoints," Check Point said in a report published today.

In other words, an attacker who manages to gain control of the on-premises TrueConf server can substitute the update package with a poisoned version, which then gets pulled by the client application installed on customers' endpoints, owing to the fact that it does not enforce adequate validation to ensure that the server-provided update has not been tampered with.

The TrueChaos campaign has been found to weaponize this flaw in the update mechanism to likely deploy the open-source Havoc command-and-control (C2) framework to vulnerable endpoints. The activity has been attributed with moderate confidence to a Chinese-nexus threat actor.

Attacks exploiting the vulnerability were first recorded by the cybersecurity company at the beginning of 2026, with the implicit trust the client places in the update mechanism being weaponized to push a rogue installer that, in turn, leverages DLL side-loading to launch a DLL backdoor.

TrueConf Zero-Day

The DLL implant ("7z-x64.dll") has also been observed performing hands-on-keyboard actions to conduct reconnaissance, set up persistence, and retrieve additional payloads ("iscsiexe.dll") from an FTP server ("47.237.15[.]197"). The primary objective of "iscsiexe.dll" is to ensure the execution of a benign binary ("poweriso.exe") that's dropped to sideload the backdoor.

Although the exact final-stage malware delivered as part of the attack is not clear, it's assessed with high confidence that the end goal is to deploy the Havoc implant.

TrueChaos' links to a Chinese-nexus threat actor are based on the observed tactics, such as the use of DLL side-loading, Alibaba Cloud, and Tencent for C2 infrastructure, and the fact that the same victim was targeted within the same time frame by ShadowPad, a sophisticated backdoor widely used by China-linked hacking groups.

On top of that, the use of Havoc has been attributed to another Chinese threat actor called Amaranth-Dragon in intrusions aimed at government and law enforcement agencies across Southeast Asia in 2025.

"The exploitation of CVE-2026-3502 did not require the attacker to compromise each endpoint individually," Check Point said. "Instead, the attacker abused the trusted relationship between a central on-premises TrueConf server and its clients. By replacing a legitimate update with a malicious one, they turned the product’s normal update flow into a malware distribution channel across multiple connected government networks."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/trueconf-zero-day-exploited-in-attacks.html
如有侵权请联系:admin#unsafe.sh