Ghost Calls: The Sneaky New Hack That Turns Zoom into a C2 Tunnel

Ghost Calls, the stealthy C2 evasion method, exploits TURN servers used by apps like Zoom and Teams to cloak nefarious traffic as innocent video calls. By hijacking legitimate credentials, it brilliantly turns a virtual meeting into a hacker’s playground, making sneaky look way too easy.

Pro Dashboard

Hot Take:

Oh, the ghostly wonders of modern-day hacking! Just when you thought your virtual meetings were only haunted by awkward silences and the occasional “You’re on mute,” here come Ghost Calls to prove that even your conference calls have a spooky side. Forget the Scooby-Doo gang, we need a new cybersecurity task force to deal with these invisibly cloaked intruders!

Key Points:

– Ghost Calls use TURN servers from conferencing apps to disguise command-and-control traffic as regular video conferencing.
– The method was revealed by Adam Crosser at BlackHat USA and is intended for Red Team exercises.
– TURN (Traversal Using Relays around NAT) is the secret sauce allowing ghostly evasion through NAT firewalls.
– The open-source utility ‘TURNt’ has been developed to facilitate this new post-exploitation method.
– Both Zoom and Microsoft Teams have been contacted for comments on this new tactic, but responses are pending.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?