Chinese Hackers Exploit TrueConf Zero-Day in 'Operation TrueChaos'

Chinese-Linked APT Exploits TrueConf Zero-Day (CVE-2026-3502) to Target Southeast Asian Governments

HIGH
April 2, 2026
April 4, 2026
6m read
VulnerabilityThreat ActorCyberattack

Related Entities(initial)

Threat Actors

Chinese-nexus threat actor

Organizations

Check PointTrueConf

Other

Havoc

CVE Identifiers

Full Report(when first published)

Executive Summary

A sophisticated cyber-espionage campaign, named "Operation TrueChaos," is actively exploiting a zero-day vulnerability (CVE-2026-3502) in the TrueConf video conferencing application. Researchers from Check Point have attributed the campaign with moderate confidence to a Chinese-nexus Advanced Persistent Threat (APT) group. The attackers are targeting government networks in Southeast Asia by subverting the application's update process to deliver malware. By compromising a target's on-premises TrueConf server, the threat actor replaces legitimate update files with malicious packages containing the Havoc post-exploitation framework. This provides the attackers with remote access and control over systems within sensitive government networks. Organizations using TrueConf are urged to update their Windows client software to version 8.5.3 or later immediately.


Threat Overview

This attack leverages a trusted internal software distribution mechanism, making it particularly insidious. Unlike traditional phishing attacks, "Operation TrueChaos" does not require user interaction with a malicious email or link. The attack chain proceeds as follows:

  1. Server Compromise: The threat actor first gains access to and compromises a target organization's on-premises TrueConf server. The method for this initial compromise is not detailed but likely involves exploiting a separate vulnerability or using stolen credentials.
  2. Update Hijacking: The attacker replaces a legitimate TrueConf client update package on the compromised server with a weaponized version.
  3. Malicious Update Delivery: The TrueConf client application, installed on user workstations within the government network, performs a routine check for updates against the on-premises server.
  4. User Prompt: The client application prompts the user to install the "new" version.
  5. Payload Execution: When the user accepts the update, the client downloads and executes the malicious package, which installs the Havoc framework, establishing a C2 channel back to the attacker.

This method abuses the inherent trust between the client application and its designated update server, effectively turning a legitimate software feature into a malware delivery system.

Technical Analysis

The campaign showcases several advanced TTPs geared towards espionage and stealth:

Impact Assessment

The targeted nature of this campaign against government entities in Southeast Asia suggests the primary motive is espionage and intelligence gathering. The impact on a compromised organization is severe:

  • Loss of Confidentiality: Attackers gain persistent access to sensitive government networks, enabling the long-term exfiltration of classified or confidential information.
  • Network Foothold: The Havoc payload provides a stable foothold from which attackers can conduct lateral movement, escalate privileges, and compromise other systems within the network.
  • Disruption of Operations: While the primary goal appears to be espionage, the level of access gained could also be used to disrupt government operations or deploy destructive payloads.
  • Erosion of Trust: The compromise of a trusted communication platform like TrueConf can undermine the security and integrity of internal government communications.

Detection & Response

Detection Methods:

  1. Network Traffic Analysis: Monitor network traffic between TrueConf clients and on-premises servers. Look for anomalies in update file sizes or hashes. Outbound connections from recently updated clients to unknown IP addresses could indicate a Havoc C2 connection. This aligns with D3-NTA: Network Traffic Analysis.
  2. Endpoint Analysis: Use EDR tools to monitor for suspicious processes spawned by the TrueConf update process. Hunt for indicators associated with the Havoc framework, such as specific process names, file paths, or registry keys used for persistence.
  3. Server Integrity Monitoring: Implement file integrity monitoring on TrueConf servers to detect unauthorized changes to update packages or server configuration files. This is a form of D3-SFA: System File Analysis.

Response Actions:

  • If compromise is suspected, isolate the affected TrueConf server and any clients that have installed the malicious update.
  • Analyze server logs and network traffic to identify the scope of the compromise.
  • Preserve affected systems for forensic analysis to identify attacker TTPs and potential data exfiltration.

Mitigation

Remediation:

  • The most critical step is to update all TrueConf for Windows client applications to version 8.5.3 or later. This version contains the patch for CVE-2026-3502, which enforces proper integrity verification of update packages.

Strategic Controls:

  • Network Segmentation: Isolate on-premises TrueConf servers from the general corporate network. Restrict access to the server's management interface to a limited set of administrative jump hosts. This is a D3-NI: Network Isolation measure.
  • Application Control: Use application control solutions to prevent unauthorized executables, such as the Havoc payload, from running on endpoints, even if they are downloaded by a trusted process.
  • Code Signing Enforcement: Where possible, configure systems to only trust and execute binaries that are signed by known, trusted developers. This would help prevent the execution of the unsigned malicious update package.

Timeline of Events

1
April 2, 2026
This article was published

Article Updates

April 3, 2026

Severity increased

CISA added CVE-2026-3502 (TrueConf zero-day) to its KEV catalog, mandating federal agencies patch by April 16, 2026, due to active exploitation.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has officially added CVE-2026-3502, the TrueConf zero-day exploited in 'Operation TrueChaos,' to its Known Exploited Vulnerabilities (KEV) catalog. This designation mandates that all Federal Civilian Executive Branch (FCEB) agencies apply the patch by April 16, 2026. The vulnerability, with a CVSS score of 7.8, is actively exploited by a Chinese-nexus threat actor targeting Southeast Asian governments. New IOCs include an FTP server IP (47.237.15[.]197) and a malicious DLL (iscsiexe.dll), with C2 infrastructure observed on Alibaba Cloud and Tencent.

April 4, 2026

Severity increased

CISA adds CVE-2026-3502, exploited by Chinese APT in 'Operation TrueChaos' targeting TrueConf, to its Known Exploited Vulnerabilities catalog, increasing urgency.

The zero-day vulnerability, CVE-2026-3502, exploited by a Chinese APT in 'Operation TrueChaos' targeting TrueConf, has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog. This inclusion signifies that the vulnerability is actively being exploited and poses a significant risk to federal agencies, urging immediate remediation. The campaign, which leverages the TrueConf client's update mechanism to deliver malware like the Havoc framework, continues to target government entities in Southeast Asia. Organizations are strongly advised to update TrueConf client software to version 8.5.3 or later to mitigate this critical threat.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

APTChinaHavocTrueConfespionagezero-day

📢 Share This Article

Help others stay informed about cybersecurity threats