• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Hackers Exploit Microsoft Teams and Zoom in New ‘Ghost Calls’ Tactic

Akinola Ajibola by Akinola Ajibola
August 7, 2025
in Security
Share on FacebookShare on Twitter

The ‘Ghost Calls’ post-exploitation command-and-control (C2) evasion technique exploits TURN servers, which are utilised by conferencing applications like as Zoom and Microsoft Teams, to tunnel communications over reliable infrastructure.

Ghost Calls circumvents the majority of current defences and anti-abuse mechanisms without the use of an attack by using WebRTC, genuine credentials, and proprietary tooling.

Adam Crosser, a security researcher at Praetorian, demonstrated this novel strategy at BlackHat USA, emphasising that Red Teams can employ it for penetration emulation exercises.

“We leverage web conferencing protocols, which are designed for real-time, low-latency communication and operate through globally distributed media servers that function as natural traffic relays,” according to the briefing for the presentation. 

“This approach allows operators to blend interactive C2 sessions into normal enterprise traffic patterns, appearing as nothing more than a temporarily joined online meeting.”

How the Ghost Calls Operate is through a Video call, VoIP, and WebRTC services in which it frequently use TURN (Traversal Using Relays across NAT), a networking protocol that facilitates communication between devices behind NAT firewalls in situations where a direct connection is not feasible.

The Ghost Calls can use the temporary TURN credentials that a Zoom or Teams client obtains when they attend a meeting to establish a TURN-based WebRTC tunnel between the victim and the attacker.

Through trusted infrastructure that Zoom or Teams utilise, this tunnel can then be used to proxy arbitrary data or mask C2 traffic as normal video conference traffic. 

Malicious traffic can get past firewalls, proxies, and TLS inspection because it is routed through authentic domains and IPs that are frequently used in the company. WebRTC traffic is also nicely disguised because it is encrypted.

By misusing these technologies, attackers can benefit from high performance, dependable connectivity, and the flexibility of using both TCP and UDP across port 443 while avoiding exposing their own domains and infrastructure.

Traditional C2 techniques, on the other hand, are noticeable, slow, and frequently do not have the real-time exchange capabilities needed to support VNC activities.

Turning it around the result of Crosser’s research was a unique open-source tool called ‘TURNt’ that can be used to tunnel C2 traffic over WebRTC TURN servers like Zoom and Teams provide. It is available on GitHub.

The two parts of TURNt are a relay installed on a compromised host and a controller operating on the attacker’s end.

In order to accept connections tunnelled using TURN, the Controller operates a SOCKS proxy server. Relay establishes a WebRTC data channel via the provider’s TURN server and reconnects to the Controller using TURN credentials.

TURNt is capable of data exfiltration, local or remote port forwarding, SOCKS proxying, and enabling covert VNC (Virtual Network Computing) traffic tunnelling.

BleepingComputer has contacted both Zoom and Microsoft Teams to enquire about their plans to implement extra security measures to lessen the viability of Ghost Calls, despite the fact that it does not take advantage of any flaws in either program. Once we hear back from either, we’ll update this post.

Related Posts:

  • Microsoft-Teams-6228c4fb14083
    Microsoft Speeds Up Teams Window Desktop Client
  • 1743588188581
    Hackers use Microsoft Teams to spread Matanbuchus malware
  • Chat_video_experience
    Microsoft Teams Integration For Windows 11 Set For Removal
  • whatsapp2
    WhatsApp Challenges Zoom With New Web-Based Calls
  • microsoft-teams-integrations-1200x675
    Microsoft Teams Introduces Brand Impersonation…
  • apps.23504.9007199266245651.6add88e5-d6c4-4b36-a1da-3fcd01d40fd5
    Microsoft Sunsets Skype as Expected, Teams to Replace It
  • Microsoft
    Microsoft Outage Affects Thousands Of Users Worldwide
  • 1_8_VsolmlGbZ-OhZN0wEgrw
    Over 46,000 Grafana Instances Vulnerable to Account Takeover

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: 'Ghost Calls' post-exploitation command-and-controlBlackHat USAC2Ghost Callsmicrosoft teamsteamszoom
Akinola Ajibola

Akinola Ajibola

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Tulupay Unveils Prelaunch of Pan-African Financial OS to Bridge Web2 and Web3 Rails April 17, 2026
  • Short-Form Video App, SaySo, To Rebuild Trust April 17, 2026
  • OpenAI Enhances Codex With Computer Control & Image Generation April 17, 2026
  • Bluesky Reviews The Outage Cause To Be A DDoS Attack April 17, 2026
  • OpenAI Unveils GPT-Rosalind, Aiming at Drug Discovery and Genomics April 17, 2026
  • Google Chrome’s AI Mode Now Handles Tabs More Like a Human Assistant April 17, 2026
  • Anthropic Launches Claude Opus 4.7 as Safer Alternative to Mythos AI April 16, 2026
  • Bluesky Seemed To Be Down For Some Time Today April 16, 2026
  • Lagos Commissioner Gives 21-Weeks Delivery Time Frame On Obalende MTN Yello Park Project April 16, 2026
  • Google Brings a Native Gemini App to macOS, With Deep Screen Access April 16, 2026
  • CAC Experiences Data Breach, Users Advised To Reset Login Credentials April 16, 2026
  • Opera adds Browser Connector for integrating AI chatbots April 16, 2026

Browse Archives

April 2026
MTWTFSS
 12345
6789101112
13141516171819
20212223242526
27282930 
« Mar    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

Chat with TechBooky AI
💬
TechBooky AI ✕
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.