A zero day flaw in a trusted supply chain software turned a legitimate government collaboration tool into a malware delivery platform. Operation TrueChaos at a Glance Zero day vulnerability discovered in the TrueConf client update mechanism (CVE20263502, CVSS 7.8) In the wild exploitation observed against government entities in Southeast Asia Malware delivery via legitimate software updates, requiring no phishing or additional initial compromise vectors Havoc, a powerful post exploitation framework, used as the suspected final stage payload Victimology, tooling, and infrastructure suggest ties to a Chinese-nexus threat actor (moderate confidence) Check Point Research were discovered the use of this vulnerability in the wild and responsibly notified the vendor who released a […]
The post When Trusted Software Updates Become the Attack Vector: Inside Operation TrueChaos and a New Zero Day Vulnerability in a Popular Collaboration Tool appeared first on Check Point Blog.
from Check Point Blog https://ift.tt/Uw4MAiB
via
No comments:
Post a Comment