Posted inCybersecurity News
New Command-and-Control (C2) method, Ghost Calls, uses Zoom and Teams TURN servers to tunnel malicious traffic undetected.
A novel command-and-control (C2) evasion method, termed "Ghost Calls," has emerged as a significant threat in post-exploitation scenarios. This innovative technique exploits TURN (Traversal Using Relays around NAT) servers operated by leading communication platforms such as Zoom and Microsoft Teams, enabling attackers to tunnel malicious traffic through infrastructure that is inherently trusted by most organizations. The stealth and sophistication of this approach pose unique challenges to traditional security defenses.