A sophisticated cyber-espionage campaign, named "Operation TrueChaos," is actively exploiting a zero-day vulnerability (CVE-2026-3502) in the TrueConf video conferencing application. Researchers from Check Point have attributed the campaign with moderate confidence to a Chinese-nexus Advanced Persistent Threat (APT) group. The attackers are targeting government networks in Southeast Asia by subverting the application's update process to deliver malware. By compromising a target's on-premises TrueConf server, the threat actor replaces legitimate update files with malicious packages containing the Havoc post-exploitation framework. This provides the attackers with remote access and control over systems within sensitive government networks. Organizations using TrueConf are urged to update their Windows client software to version 8.5.3 or later immediately.
This attack leverages a trusted internal software distribution mechanism, making it particularly insidious. Unlike traditional phishing attacks, "Operation TrueChaos" does not require user interaction with a malicious email or link. The attack chain proceeds as follows:
This method abuses the inherent trust between the client application and its designated update server, effectively turning a legitimate software feature into a malware delivery system.
The campaign showcases several advanced TTPs geared towards espionage and stealth:
T1195.002 - Compromise Software Supply Chain: Compromise Software: By compromising the on-premises server, the attackers are effectively poisoning the software supply chain within the target's own environment.T1190 - Exploit Public-Facing Application: This is a likely vector for the initial compromise of the on-premises TrueConf server.T1219 - Remote Access Software: The use of the Havoc framework, an open-source command-and-control (C2) tool, provides the attackers with extensive post-exploitation capabilities, including command execution, file transfer, and credential harvesting.T1566.001 - Spearphishing Attachment: Although the primary vector is update hijacking, the user prompt to accept the update shares characteristics with social engineering, relying on the user to authorize the malicious action.The targeted nature of this campaign against government entities in Southeast Asia suggests the primary motive is espionage and intelligence gathering. The impact on a compromised organization is severe:
Detection Methods:
Response Actions:
Remediation:
Strategic Controls:
CISA added CVE-2026-3502 (TrueConf zero-day) to its KEV catalog, mandating federal agencies patch by April 16, 2026, due to active exploitation.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has officially added CVE-2026-3502, the TrueConf zero-day exploited in 'Operation TrueChaos,' to its Known Exploited Vulnerabilities (KEV) catalog. This designation mandates that all Federal Civilian Executive Branch (FCEB) agencies apply the patch by April 16, 2026. The vulnerability, with a CVSS score of 7.8, is actively exploited by a Chinese-nexus threat actor targeting Southeast Asian governments. New IOCs include an FTP server IP (47.237.15[.]197) and a malicious DLL (iscsiexe.dll), with C2 infrastructure observed on Alibaba Cloud and Tencent.
CISA adds CVE-2026-3502, exploited by Chinese APT in 'Operation TrueChaos' targeting TrueConf, to its Known Exploited Vulnerabilities catalog, increasing urgency.
The zero-day vulnerability, CVE-2026-3502, exploited by a Chinese APT in 'Operation TrueChaos' targeting TrueConf, has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog. This inclusion signifies that the vulnerability is actively being exploited and poses a significant risk to federal agencies, urging immediate remediation. The campaign, which leverages the TrueConf client's update mechanism to deliver malware like the Havoc framework, continues to target government entities in Southeast Asia. Organizations are strongly advised to update TrueConf client software to version 8.5.3 or later to mitigate this critical threat.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats