PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks

Share
Minimalist vector on solid brown: A white video camera icon with a red "hacker" skull overlaid, representing collaboration software exploitation.

A pro-Ukrainian hacktivist group called PhantomCore has been exploiting three TrueConf video conferencing flaws (BDU-2025-10114, 10115, 10116) since September 2025 to breach Russian networks. By chaining these vulnerabilities, the group bypasses authentication and executes arbitrary OS commands, turning video conferencing servers into springboards for lateral movement and data harvesting.

ST. PETERSBURG, RUSSIA — Security researchers have identified a massive infiltration campaign targeting Russian government and private organizations, spearheaded by the pro-Ukrainian hacktivist collective known as PhantomCore (also tracked as Fairy-Trickster or Head-Mare). The group is leveraging a high-impact exploit chain within TrueConf Server, a dominant domestic video conferencing platform in the Russian market.

The campaign, which began shortly after patches were released in late August 2025, exploits a window of unpatched infrastructure. By chaining three distinct flaws, PhantomCore achieves full Remote Code Execution (RCE), allowing them to deploy web shells and establish persistent reverse SOCKS tunnels into the heart of Russian internal networks.


TrueConf RCE Chain (BDU-2025-10114/15/16)

Vulnerability Analysis: TrueConf Exploit Chain
Component ID Impact & Mechanism
BDU-2025-10114 Access Control Bypass: Allows attackers to reach administrative endpoints (/admin/*) without authentication.
BDU-2025-10115 Arbitrary File Read: Enables theft of sensitive system files, including configuration and server credentials.
BDU-2025-10116 Command Injection (CVSS 9.8): The final link allowing full OS command execution on the target TrueConf server.

Incident Analysis: Video Conferencing as a Network Pivot

Collaboration tools like TrueConf are increasingly becoming the "soft underbelly" of enterprise security. Because these servers must be accessible to both internal and external users, they occupy a unique position in the network topology.

PhantomCore's tradecraft involves deploying a custom malicious client named PhantomPxPigeon. This tool acts as a reverse shell endpoint, routing commands through the compromised TrueConf server to masquerade malicious traffic as legitimate video conferencing data. Once established, the group moves laterally using open-source tools like Velociraptor and Memprocfs to harvest credentials and dump memory from adjacent workstations.

Geopolitical Hacktivism: The "Regional Software" Strategy

This campaign signals a refined strategy by pro-Ukrainian groups: the targeted hunting of vulnerabilities in domestic software vendors that have replaced Western alternatives (like Zoom or Teams) in Russia. By privately developing exploits for regional platforms like TrueConf, PhantomCore can achieve high-density infiltration across multiple sectors — government, critical infrastructure, and public administration — with a single exploit chain.


The CyberSignal Analysis: Strategic Signals

Signal 01 — The High Risk of the "Collaboration Pivot"

This incident proves that video conferencing platforms must be hardened with the same rigor as edge firewalls. PhantomCore used these servers not just for eavesdropping, but as high-velocity entry points for network-wide compromise. For defenders, this highlights the necessity of monitoring for unusual SOCKS tunnels and web shell processes originating from collaboration servers.

Signal 02 — The Evolution of Pro-Ukrainian Hacktivism

PhantomCore represents a shift from simple DDoS attacks to sophisticated geopolitical cyber operations. By utilizing custom-built RATs like MacTunnelRAT and advanced proxying techniques, they are operating with the technical depth of state-sponsored APTs, even while maintaining their hacktivist identity.

Signal 03 — The "Patch Window" Trap

Despite TrueConf releasing patches on August 27, exploitation began in earnest just two weeks later. This narrow window demonstrates how quickly hacktivist groups can reverse-engineer patches to develop working exploits. Organizations that delay "domestic software" updates are now prime targets for these rapid-response exploitation campaigns.


Sources

Type Source
Technical The Hacker News: PhantomCore RCE Chain Analysis
Intelligence Cypro: TrueConf Breach Investigation
Reporting SecurityWeek: Regional Software Targeting Trends
Repository Malpedia: PhantomCore Group Profile
Analysis SOC Defenders: TrueConf Server RCE Guidance