Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PhantomCore Exploits Russian Video Conferencing Software

PhantomCore Exploits Russian Video Conferencing Software

Posted on April 27, 2026 By CWS

A pro-Ukrainian hacktivist group, known as PhantomCore, has been implicated in cyberattacks targeting Russian servers using TrueConf video conferencing software since September 2025. According to a report from Positive Technologies, PhantomCore has been exploiting a chain of three vulnerabilities to execute remote commands on vulnerable systems.

Exploitation of TrueConf Vulnerabilities

PhantomCore, also referred to as Fairy Trickster, Head Mare, Rainbow Hyena, and UNG0901, has been active since 2022 following the Russo-Ukrainian conflict. The group has been using unpublicized exploits to breach Russian organizations, resulting in data theft and network disruptions, including deploying ransomware based on Babuk and LockBit source codes.

The vulnerabilities in TrueConf Server exploited include BDU:2025-10114, which allows unauthorized access to administrative endpoints, BDU:2025-10115 for reading arbitrary files, and BDU-2025-10116, a command injection flaw. Despite TrueConf releasing patches on August 27, 2025, attacks were first detected in mid-September 2025.

Impact and Tools Used by PhantomCore

Through exploiting these vulnerabilities, attackers have bypassed authentication to access networks, using the compromised TrueConf Server as a launch point for further infiltration. They deployed malicious payloads for reconnaissance, evasion, and credential harvesting, and established communication channels with tunneling utilities.

Some attacks involved deploying a PHP-based web shell to upload files and execute remote commands. Other tools used include PhantomPxPigeon, PhantomSscp, MacTunnelRat, and PhantomProxyLite for reverse SSH tunnels, ADRecon for reconnaissance, and Veeam-Get-Creds for password recovery.

Broader Cyber Threat Landscape

PhantomCore’s activities are part of a wider pattern of cyber threats targeting Russian entities, with groups like CapFIX also conducting phishing campaigns. CapFIX, focusing on financial gains, has used phishing to deploy malware like CapDoor, capable of executing commands and installing files from remote servers.

Other threat actors such as Geo Likho, Mythic Likho, and various ‘Werewolf’ groups have targeted sectors like aviation, using techniques like phishing and deploying diverse malware for espionage and disruption. Despite utilizing similar methods, these groups operate independently, without direct coordination.

In conclusion, PhantomCore represents a significant cyber threat in the region, with its capability to exploit vulnerabilities and deploy sophisticated attacks posing ongoing challenges for cybersecurity defenses in Russia. The group’s persistent efforts to identify and leverage software weaknesses underscore the importance of timely security updates and robust protective measures.

The Hacker News Tags:cyber attacks, cyber espionage, cyber threat, Cybersecurity, data breach, hacktivist group, network breach, PhantomCore, Ransomware, Russian networks, security patches, software vulnerabilities, TrueConf, video conferencing, Vulnerabilities

Post navigation

Previous Post: Vidar Malware Exploits Fake Downloads to Steal Data
Next Post: Critical OpenSSH Security Flaw Existed for 15 Years

Related Posts

Citrix Urges Immediate Patching of Critical NetScaler Flaws Citrix Urges Immediate Patching of Critical NetScaler Flaws The Hacker News
SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers The Hacker News
Storm-2603 Exploits SharePoint Flaws to Deploy Warlock Ransomware on Unpatched Systems Storm-2603 Exploits SharePoint Flaws to Deploy Warlock Ransomware on Unpatched Systems The Hacker News
Addressing Security Risks of Unregulated AI in Businesses Addressing Security Risks of Unregulated AI in Businesses The Hacker News
BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells The Hacker News
TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Itron Investigates Cyber Breach Affecting Systems
  • Fake VS Code Extensions Spread GlassWorm v2 Malware
  • Malware Campaign Evades Detection with Advanced Techniques
  • Critical OpenSSH Security Flaw Existed for 15 Years
  • PhantomCore Exploits Russian Video Conferencing Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Itron Investigates Cyber Breach Affecting Systems
  • Fake VS Code Extensions Spread GlassWorm v2 Malware
  • Malware Campaign Evades Detection with Advanced Techniques
  • Critical OpenSSH Security Flaw Existed for 15 Years
  • PhantomCore Exploits Russian Video Conferencing Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark