When Trusted Software Updates Become the Attack Vector: Inside Operation TrueChaos and a New Zero Day Vulnerability in a Popular Collaboration Tool

A zero day flaw in a trusted supply chain software turned a legitimate government collaboration tool into a malware delivery platform.  Operation TrueChaos at a Glance  Zero day vulnerability discovered in the TrueConf client update mechanism (CVE20263502, CVSS 7.8)  In the wild exploitation observed against government entities in Southeast Asia  Malware delivery via legitimate software updates, requiring no phishing or additional initial compromise vectors   Havoc, a powerful post exploitation framework, used as the suspected final stage payload  Victimology, tooling, and infrastructure suggest ties to a Chinese-nexus threat actor (moderate confidence)  Check Point Research were discovered the use of this vulnerability in the wild and responsibly notified the vendor who released a […]

The post When Trusted Software Updates Become the Attack Vector: Inside Operation TrueChaos and a New Zero Day Vulnerability in a Popular Collaboration Tool appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/Uw4MAiB
via

No comments:

Post a Comment

When Trusted Software Updates Become the Attack Vector: Inside Operation TrueChaos and a New Zero Day Vulnerability in a Popular Collaboration Tool

A zero day flaw in a trusted supply chain software turned a legitimate government collaboration tool into a malware delivery platform.  Ope...