TrueConf video conferencing software is the target of the ‘TrueChaos’ campaign, an active zero-day exploitation effort targeting government and military organizations in Southeast Asia by hijacking the software’s update mechanism to deliver malware. No CVE identifier has been assigned and no vendor patch has been confirmed as of 2026-04-05; CISA KEV inclusion is asserted in secondary reporting but is not confirmed in primary structured data. Organizations should immediately disable TrueConf automatic updates at host and network level, audit update process activity for anomalous child process execution or unexpected outbound connections, and verify patch and advisory status directly with TrueConf at trueconf.com before re-enabling update functionality.