• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Hackers Exploit Microsoft Teams and Zoom in New ‘Ghost Calls’ Tactic

Akinola Ajibola by Akinola Ajibola
August 7, 2025
in Security
Share on FacebookShare on Twitter

The ‘Ghost Calls’ post-exploitation command-and-control (C2) evasion technique exploits TURN servers, which are utilised by conferencing applications like as Zoom and Microsoft Teams, to tunnel communications over reliable infrastructure.

Ghost Calls circumvents the majority of current defences and anti-abuse mechanisms without the use of an attack by using WebRTC, genuine credentials, and proprietary tooling.

Adam Crosser, a security researcher at Praetorian, demonstrated this novel strategy at BlackHat USA, emphasising that Red Teams can employ it for penetration emulation exercises.

“We leverage web conferencing protocols, which are designed for real-time, low-latency communication and operate through globally distributed media servers that function as natural traffic relays,” according to the briefing for the presentation. 

“This approach allows operators to blend interactive C2 sessions into normal enterprise traffic patterns, appearing as nothing more than a temporarily joined online meeting.”

How the Ghost Calls Operate is through a Video call, VoIP, and WebRTC services in which it frequently use TURN (Traversal Using Relays across NAT), a networking protocol that facilitates communication between devices behind NAT firewalls in situations where a direct connection is not feasible.

The Ghost Calls can use the temporary TURN credentials that a Zoom or Teams client obtains when they attend a meeting to establish a TURN-based WebRTC tunnel between the victim and the attacker.

Through trusted infrastructure that Zoom or Teams utilise, this tunnel can then be used to proxy arbitrary data or mask C2 traffic as normal video conference traffic. 

Malicious traffic can get past firewalls, proxies, and TLS inspection because it is routed through authentic domains and IPs that are frequently used in the company. WebRTC traffic is also nicely disguised because it is encrypted.

By misusing these technologies, attackers can benefit from high performance, dependable connectivity, and the flexibility of using both TCP and UDP across port 443 while avoiding exposing their own domains and infrastructure.

Traditional C2 techniques, on the other hand, are noticeable, slow, and frequently do not have the real-time exchange capabilities needed to support VNC activities.

Turning it around the result of Crosser’s research was a unique open-source tool called ‘TURNt’ that can be used to tunnel C2 traffic over WebRTC TURN servers like Zoom and Teams provide. It is available on GitHub.

The two parts of TURNt are a relay installed on a compromised host and a controller operating on the attacker’s end.

In order to accept connections tunnelled using TURN, the Controller operates a SOCKS proxy server. Relay establishes a WebRTC data channel via the provider’s TURN server and reconnects to the Controller using TURN credentials.

TURNt is capable of data exfiltration, local or remote port forwarding, SOCKS proxying, and enabling covert VNC (Virtual Network Computing) traffic tunnelling.

BleepingComputer has contacted both Zoom and Microsoft Teams to enquire about their plans to implement extra security measures to lessen the viability of Ghost Calls, despite the fact that it does not take advantage of any flaws in either program. Once we hear back from either, we’ll update this post.

Related Posts:

  • blog-simpler-image-1536×864
    Newly Redesigned Teams Is Faster And Consumes Less Memory
  • Microsoft-Teams-Will-Let-You-Transform-Into-a-3D-Avatar-in-May-scaled
    Microsoft Teams Is Rolling Out 3D Avatars In May.
  • Chat_video_experience
    Microsoft Teams Integration For Windows 11 Set For Removal
  • 1743588188581
    Hackers use Microsoft Teams to spread Matanbuchus malware
  • GettyImages-1208677868
    Zoom Is Evolving, Introduces New AI Features
  • apps.23504.9007199266245651.6add88e5-d6c4-4b36-a1da-3fcd01d40fd5
    Microsoft Sunsets Skype as Expected, Teams to Replace It
  • FotoJet-7-76-635×430
    Microsoft To Integrate Teams Into Outlook
  • 1_8_VsolmlGbZ-OhZN0wEgrw
    Over 46,000 Grafana Instances Vulnerable to Account Takeover

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: 'Ghost Calls' post-exploitation command-and-controlBlackHat USAC2Ghost Callsmicrosoft teamsteamszoom
Akinola Ajibola

Akinola Ajibola

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • How to Read Faster: 10 Best Speed Reading Apps in 2025 (Ranked & Reviewed) August 31, 2025
  • WhatsApp Working On Shorter Disappearing Message Timers August 29, 2025
  • Threads Tests Long-Form Text Sharing Feature August 29, 2025
  • WhatsApp Tests AI to Rephrase Messages and Adjust Tone August 29, 2025
  • Musk’s xAI Unveils New Agentic Coding Model August 29, 2025
  • Google Launches Pixel Care+ Device Protection August 29, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.