top of page
perceptive_background_267k.jpg

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

Published:

31 March 2026 at 16:03:00

Alert date:

31 March 2026 at 17:08:47

Source:

thehackernews.com

Click to open the original link from this advisory

Enterprise Applications, Zero-Day Vulnerabilities, Ransomware & Malware

A high-severity zero-day vulnerability (CVE-2026-3502) in TrueConf video conferencing software has been actively exploited in attacks targeting Southeast Asian government entities. The campaign has been dubbed TrueChaos. The vulnerability stems from a lack of integrity check when fetching application updates, allowing attackers to distribute tampered updates. With a CVSS score of 7.8, this supply chain attack vector poses significant risks to government networks using the affected software.

Technical details

CVE-2026-3502 is a high-severity vulnerability in TrueConf client video conferencing software that lacks integrity checks when fetching application updates. Attackers who control on-premises TrueConf servers can distribute tampered updates containing arbitrary code. The attack leverages DLL side-loading to launch a DLL backdoor (7z-x64.dll) that performs reconnaissance, establishes persistence, and retrieves additional payloads (iscsiexe.dll) from FTP servers. The malware uses a benign binary (poweriso.exe) to sideload the backdoor, ultimately deploying the Havoc command-and-control framework.

Mitigation steps:

Update TrueConf Windows client to version 8.5.3 or later. Monitor for DLL side-loading activities and suspicious update mechanisms. Implement additional validation for software update processes and monitor communications with known malicious infrastructure.

Affected products:

TrueConf Windows client (versions before 8.5.3)

Related links:

Related CVE's:

Related threat actors:

IOC's:

7z-x64.dll, iscsiexe.dll, poweriso.exe, 47.237.15[.]197

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page