BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Zero-Day Exploitation Surges: TrueConf Attack, North Korean Supply Chain Hit, and Living-Off-The-Land Tactics

Zero-Day Exploitation Surges: TrueConf Attack, North Korean Supply Chain Hit, and Living-Off-The-Land Tactics

highVulnerabilities & Exploits|April 1, 20264 min read

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

#zero-day#supply-chain#living-off-the-land#north-korea#apt#vertex-ai#whatsapp-malware#trueconf
Share

TL;DR

Attackers are exploiting zero-day vulnerabilities in TrueConf video conferencing software targeting Southeast Asian governments and compromising the popular Axios npm package through North Korean threat actors. Meanwhile, cybercriminals are shifting tactics to abuse legitimate administrative tools already present in enterprise environments.

Why high?

Multiple actively exploited zero-day vulnerabilities including TrueConf targeting government networks and a North Korean supply chain attack on popular npm packages represent immediate threats requiring urgent attention.

Active Zero-Day Exploitation Targets Enterprise Infrastructure

TrueConf Zero-Day Exploited Against Southeast Asian Governments

Security researchers have identified active exploitation of CVE-2026-3502 (CVSS 7.8) in TrueConf client video conferencing software. The vulnerability stems from inadequate integrity checks during application updates, enabling attackers to distribute tampered update packages.

The campaign, dubbed TrueChaos, specifically targets government entities across Southeast Asia. The flaw allows threat actors to compromise systems through malicious updates pushed to legitimate TrueConf installations, providing a foothold for further network infiltration.

North Korean Actors Compromise Axios npm Package Supply Chain

Google Threat Intelligence Group has attributed the supply chain compromise of the widely-used Axios npm package to UNC1069, a North Korean threat cluster with financial motivations. According to Google's John Hultquist, the attribution represents another instance of North Korean actors targeting software supply chains to maximize impact across multiple organizations simultaneously.

The Axios library, with millions of weekly downloads, provided UNC1069 with extensive reach into JavaScript development environments. This attack demonstrates the continued evolution of North Korean cyber operations beyond traditional cryptocurrency theft toward broader supply chain manipulation.

Cloud Platform Vulnerabilities Surface in AI Services

Google Cloud Vertex AI Permission Model Bypass

Palo Alto Networks Unit 42 researchers disclosed a critical security blind spot in Google Cloud's Vertex AI platform. The vulnerability relates to permission model misuse that could enable attackers to weaponize AI agents for unauthorized data access and cloud environment compromise.

The research highlights how AI platforms introduce novel attack vectors that traditional security controls may not adequately address. Organizations deploying AI services need to reassess their permission boundaries and data exposure risks.

Living-Off-The-Land Tactics Dominate Attack Strategies

Legitimate Tools Weaponized for Stealth Operations

Threat actors are increasingly abandoning traditional malware in favor of abusing trusted tools, native binaries, and legitimate administrative utilities already present in target environments. This shift enables lateral movement, privilege escalation, and persistence while evading detection systems designed to identify malicious file signatures.

The trend represents a fundamental challenge to signature-based security models, requiring organizations to implement behavior-based monitoring and zero-trust architectures that assume compromise rather than relying on perimeter defenses.

WhatsApp Delivers Multi-Stage VBScript Campaign

Microsoft Security reported a sophisticated malware campaign leveraging WhatsApp messages to initiate multi-stage infection chains. The attack delivers VBScript payloads that utilize renamed Windows tools and cloud-hosted components to install MSI backdoors, maintaining persistent access while blending with legitimate system activity.

The campaign demonstrates how attackers combine social engineering through trusted communication platforms with fileless techniques to establish persistent footholds in target networks.

Android Security Enforcement Expands Globally

Developer Verification Mandate Approaches

Google has begun rolling out Android developer verification requirements ahead of mandatory enforcement in Brazil, Indonesia, Singapore, and Thailand this September. The initiative aims to combat malicious app distribution by anonymous threat actors who exploit the platform's accessibility.

The verification mandate will expand globally in 2027, representing a significant shift toward accountability in mobile application ecosystems. Organizations managing Android devices should prepare for potential app availability changes as the verification requirements take effect.

Microsoft Publishes Multiple CVE Disclosures

Microsoft released information on several new CVEs affecting various components:

  • CVE-2026-34353: Details pending
  • CVE-2025-66037: OpenSC out-of-bounds vulnerability
  • CVE-2026-4746: Heap buffer overflow in timeplus-io/proton
  • CVE-2026-0967: Libssh denial of service via inefficient regex processing
  • CVE-2026-4176: Perl Compress::Raw::Zlib vulnerability affecting multiple versions

Additional Linux kernel vulnerabilities were also disclosed, including XFS filesystem and netfilter bridge issues.

Enterprise Security Recommendations

AI Security Framework Implementation

Microsoft published guidance for CISOs on applying security fundamentals to AI environments. The recommendations emphasize extending traditional security principles to AI workloads while addressing unique risks posed by machine learning systems and data processing pipelines.

Fileless Malware Detection Enhancement

SANS Internet Storm Center highlighted techniques used by malware to minimize filesystem footprints, including abuse of Windows Alternate Data Streams (ADS) and registry-based persistence mechanisms. Organizations should implement behavior-based detection capabilities that monitor process execution patterns rather than relying solely on file-based signatures.

Sources

  • https://thehackernews.com/2026/04/3-reasons-attackers-are-using-your.html
  • https://thehackernews.com/2026/04/google-attributes-axios-npm-supply.html
  • https://thehackernews.com/2026/03/android-developer-verification-rollout.html
  • https://thehackernews.com/2026/03/trueconf-zero-day-exploited-in-attacks.html
  • https://thehackernews.com/2026/03/vertex-ai-vulnerability-exposes-google.html
  • https://www.microsoft.com/en-us/security/blog/2026/03/31/applying-security-fundamentals-to-ai-practical-advice-for-cisos/
  • https://www.microsoft.com/en-us/security/blog/2026/03/31/whatsapp-malware-campaign-delivers-vbs-payloads-msi-backdoors/
  • https://isc.sans.edu/diary/rss/32854
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41013
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-52676
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35839
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34353
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66037
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4746
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0967
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4176

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

Tags

#zero-day#supply-chain#living-off-the-land#north-korea#apt#vertex-ai#whatsapp-malware#trueconf

Threat Actors

🏴Anonymous

Tracked Companies

🇺🇸Google
🇺🇸Meta Platforms

Related Intelligence

  • Critical Chrome Zero-Day Under Active Attack, North Korean Campaigns Target KakaoTalk, Supply Chain Attacks Hit Python Repos

    criticalMar 17, 2026
  • Critical Infrastructure Under Fire: Cisco Zero-Day Exploited Since 2023, Google Disrupts China APT

    criticalFeb 26, 2026
  • March Patch Tuesday: Microsoft Fixes 84 Flaws Including Zero-Days, Supply Chain Attacks Surge

    highMar 11, 2026

Related Knowledge

  • NERF Training: Vulnerability Research Deep Dive

    offensive
  • NERF Web Security Deep Dive — Training Knowledge Base

    offensive
  • NERF Offensive Security Deep Reference

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Axios NPM Package Compromised via Stolen Token, RAT Deployed to 100M Weekly Downloads

Next Article

Supply Chain Strikes Hit Cisco and npm Ecosystem as AI Security Concerns Mount→