New Ghost Calls tactic abuses Zoom and Microsoft Teams for C2 operations

New Ghost Calls tactic abuses Zoom and Microsoft Teams for C2 operations

A new evasion technique called β€˜Ghost Calls’ manipulates TURN servers used by conferencing apps like Zoom and Microsoft Teams to hide C2 traffic within legitimate video conferencing data. This method allows attackers to bypass firewalls and encryption, making malicious communication difficult to detect. #GhostCalls #TURNservers

Keypoints

  • Ghost Calls exploits TURN servers used by Zoom and Teams for covert C2 communication.
  • The technique bypasses firewalls, proxies, and TLS inspection by blending into normal enterprise traffic.
  • It uses WebRTC protocols and legitimate credentials to establish secure tunnels for data exfiltration and control.
  • Praetorian developed an open-source tool called β€˜TURNt’ to facilitate this tunneling method.
  • The technique does not rely on vulnerabilities in conferencing apps but utilizes their infrastructure for malicious purposes.

Read More: https://www.bleepingcomputer.com/news/security/new-ghost-calls-tactic-abuses-zoom-and-microsoft-teams-for-c2-operations/