TrueConf Zero-Day Vulnerability Exploited to Target Government Networks
6 Articles
6 Articles
'By replacing a legitimate update with a malicious one, they turned the product’s update flow into a malware distribution channel': Experts find flaw in TrueConf video conferencing tool used by governments, military
Sophisticated cyber-espionage campaign recently uncovered targeting government entities in Southeast Asia.
A previously unknown vulnerability in TrueConf has enabled attackers to access sensitive government networks.
Check Point Research (CPR) has revealed a previously unknown zero-day security vulnerability in the "TrueConf" video conferencing software. As security researchers at Check Point Software Technologies discovered, attackers could misuse trusted locally installed software updates. They spread malware unnoticed in several South East Asian authorities and government apparatuses. Thus, the perpetrators did not have to use phishing, i.e. the theft of …
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium



