[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f0aA7BxJ-1-cnIjTUe0aOF002ByhQC-Vel-PW9mOqTM4":3},{"article":4,"iocs":47},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":27,"category":28,"article_tags":31},"18dea66d-7d77-4079-b593-29dce63475ad","PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks","phantomcore-exploits-trueconf-vulnerabilities-to-breach-russian-networks-a0d3ca","A pro-Ukrainian hacktivist group called PhantomCore has been attributed to attacks actively targeting servers running TrueConf video conferencing software in Russia since September 2025. That's according to a report published by Positive Technologies, which found the threat actors to be leveraging an exploit chain comprising three vulnerabilities to execute commands remotely on susceptible","Pro-Ukrainian hacktivist group PhantomCore has been actively targeting TrueConf video conferencing servers in Russia since September 2025, according to Positive Technologies research. The threat actors are leveraging an exploit chain of three vulnerabilities to achieve remote command execution on vulnerable systems. This represents a coordinated campaign against Russian infrastructure using publicly disclosed or newly discovered flaws.","PhantomCore hacktivists exploit TrueConf vulnerabilities to breach Russian networks.",null,"https:\u002F\u002Fthehackernews.com\u002F2026\u002F04\u002Fphantomcore-exploits-trueconf.html","https:\u002F\u002Fblogger.googleusercontent.com\u002Fimg\u002Fb\u002FR29vZ2xl\u002FAVvXsEi02vvwkoYlj343usA-GYXcQHZKIceJufKYFzZNyHlsGQ6lCPD8H8bHEWtzBnJsWmnlQsGq0fBLgyKTdnOoEi83L3kQ8V3EOou_vlAmMhnMDFU5P5LxA-Sz1agVhDmFrd2qKHGnYZituJuoAEsHp0ExFR4pw6VCf9VNESl7C4q5Wkefh6_8rN2MDK96yh_a\u002Fs1600\u002Frussian-cyberattack.jpg","2026-04-27T11:54:00+00:00","2026-04-27T14:00:23.328976+00:00",8,[18,21,24],{"name":19,"type":20},"PhantomCore","threat_actor",{"name":22,"type":23},"TrueConf","product",{"name":25,"type":26},"Positive Technologies","vendor","6cbdd207-aaa1-4176-9534-e156b125e917",{"id":27,"icon":11,"name":29,"slug":30},"Nation-state","nation-state",[32,37,42],{"category":33},{"id":34,"icon":11,"name":35,"slug":36},"80544778-fabb-4dcd-aa35-17492e5dcf4f","Vulnerabilities","vulnerabilities",{"category":38},{"id":39,"icon":11,"name":40,"slug":41},"c5eccf7c-abbc-4bd3-bbed-e6da5cba8e73","Incident Response","incident-response",{"category":43},{"id":44,"icon":11,"name":45,"slug":46},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[48],{"type":49,"value":19,"context":50},"malware","Pro-Ukrainian hacktivist group conducting exploit chain attacks against TrueConf"]