• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Hackers Exploit Microsoft Teams and Zoom in New ‘Ghost Calls’ Tactic

Akinola Ajibola by Akinola Ajibola
August 7, 2025
in Security
Share on FacebookShare on Twitter

The ‘Ghost Calls’ post-exploitation command-and-control (C2) evasion technique exploits TURN servers, which are utilised by conferencing applications like as Zoom and Microsoft Teams, to tunnel communications over reliable infrastructure.

Ghost Calls circumvents the majority of current defences and anti-abuse mechanisms without the use of an attack by using WebRTC, genuine credentials, and proprietary tooling.

Adam Crosser, a security researcher at Praetorian, demonstrated this novel strategy at BlackHat USA, emphasising that Red Teams can employ it for penetration emulation exercises.

“We leverage web conferencing protocols, which are designed for real-time, low-latency communication and operate through globally distributed media servers that function as natural traffic relays,” according to the briefing for the presentation. 

“This approach allows operators to blend interactive C2 sessions into normal enterprise traffic patterns, appearing as nothing more than a temporarily joined online meeting.”

How the Ghost Calls Operate is through a Video call, VoIP, and WebRTC services in which it frequently use TURN (Traversal Using Relays across NAT), a networking protocol that facilitates communication between devices behind NAT firewalls in situations where a direct connection is not feasible.

The Ghost Calls can use the temporary TURN credentials that a Zoom or Teams client obtains when they attend a meeting to establish a TURN-based WebRTC tunnel between the victim and the attacker.

Through trusted infrastructure that Zoom or Teams utilise, this tunnel can then be used to proxy arbitrary data or mask C2 traffic as normal video conference traffic. 

Malicious traffic can get past firewalls, proxies, and TLS inspection because it is routed through authentic domains and IPs that are frequently used in the company. WebRTC traffic is also nicely disguised because it is encrypted.

By misusing these technologies, attackers can benefit from high performance, dependable connectivity, and the flexibility of using both TCP and UDP across port 443 while avoiding exposing their own domains and infrastructure.

Traditional C2 techniques, on the other hand, are noticeable, slow, and frequently do not have the real-time exchange capabilities needed to support VNC activities.

Turning it around the result of Crosser’s research was a unique open-source tool called ‘TURNt’ that can be used to tunnel C2 traffic over WebRTC TURN servers like Zoom and Teams provide. It is available on GitHub.

The two parts of TURNt are a relay installed on a compromised host and a controller operating on the attacker’s end.

In order to accept connections tunnelled using TURN, the Controller operates a SOCKS proxy server. Relay establishes a WebRTC data channel via the provider’s TURN server and reconnects to the Controller using TURN credentials.

TURNt is capable of data exfiltration, local or remote port forwarding, SOCKS proxying, and enabling covert VNC (Virtual Network Computing) traffic tunnelling.

BleepingComputer has contacted both Zoom and Microsoft Teams to enquire about their plans to implement extra security measures to lessen the viability of Ghost Calls, despite the fact that it does not take advantage of any flaws in either program. Once we hear back from either, we’ll update this post.

Related Posts:

  • blog-simpler-image-1536x864
    Newly Redesigned Teams Is Faster And Consumes Less Memory
  • Microsoft-Teams-6228c4fb14083
    Microsoft Speeds Up Teams Window Desktop Client
  • Microsoft-Teams-Will-Let-You-Transform-Into-a-3D-Avatar-in-May-scaled
    Microsoft Teams Is Rolling Out 3D Avatars In May.
  • 1743588188581
    Hackers use Microsoft Teams to spread Matanbuchus malware
  • Chat_video_experience
    Microsoft Teams Integration For Windows 11 Set For Removal
  • whatsapp2
    WhatsApp Challenges Zoom With New Web-Based Calls
  • GettyImages-1208677868
    Zoom Is Evolving, Introduces New AI Features
  • microsoft-teams-integrations-1200x675
    Microsoft Teams Introduces Brand Impersonation…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: 'Ghost Calls' post-exploitation command-and-controlBlackHat USAC2Ghost Callsmicrosoft teamsteamszoom
Akinola Ajibola

Akinola Ajibola

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Google Drops Play Store Fees to 20% in Epic Games Settlement March 4, 2026
  • Google Launches Gemini Canvas in AI Mode for US Users March 4, 2026
  • Sony Reverses Course On PC Ports For Big First‑Party PlayStation Games March 4, 2026
  • Apple Unveils $599 MacBook Neo Powered by A18 Pro Chip March 4, 2026
  • Xiaomi Targets Yearly Chip Launches and AI Assistant Expansion March 4, 2026
  • OpenAI Reportedly Building GitHub Rival Despite Microsoft Ties March 4, 2026
  • OpenAI Launches GPT-5.3 Instant to Improve ChatGPT’s Accuracy and Flow March 3, 2026
  • Apple Launches Studio Display Line with 120Hz and mini-LED March 3, 2026
  • Apple Unveils MacBook Air with M5 Starting at $999 March 3, 2026
  • Apple Unveils MacBook Pro with M5 Pro and M5 Max March 3, 2026
  • AWS Data Centres in UAE and Bahrain Hit by Strikes March 3, 2026
  • Claude Memory Rolls Out to Free Tier as Anthropic Adds Import Tool March 3, 2026

Browse Archives

March 2026
MTWTFSS
 1
2345678
9101112131415
16171819202122
23242526272829
3031 
« Feb    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.