Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control

New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control

Posted on August 7, 2025August 7, 2025 By CWS

A classy new assault approach known as “Ghost Calls” exploits internet conferencing platforms to determine covert command and management (C2) channels. 

Introduced by Adam Crosser from Praetorian at Black Hat USA 2025, this groundbreaking analysis demonstrates how attackers can leverage the TURN protocol and legit conferencing infrastructure to bypass community safety measures.

Key Takeaways1. TURNt instrument exploits the TURN protocol from Zoom/Groups/Meet to create hidden command & management channels.2.  Makes use of respectable conferencing ports and advantages from company TLS inspection exemptions3. Encrypted visitors seems equivalent to regular video calls, defeating conventional community monitoring

The assault makes use of a newly developed instrument known as TURNt (TURN tunneler), which abuses the TURN (Traversal Utilizing Relays round NAT) protocol generally utilized by internet conferencing functions. 

TURN servers, important for WebRTC communications, allow peer-to-peer connections by means of firewalls and NAT gadgets. 

The instrument targets explicitly main platforms, together with Zoom (55.91% market share), Microsoft Groups (32.29%), and Google Meet (5.52%).

TURNt operates by acquiring TURN credentials from respectable internet conferencing classes, which usually stay legitimate for a number of days. These credentials use the format:

The assault leverages normal ports like 443/TCP for TLS connections and 8801/UDP for media visitors, making detection extraordinarily difficult as this visitors seems equivalent to respectable video conferencing.

What makes Ghost Calls significantly insidious is the way it exploits safety suggestions from conferencing suppliers themselves, reads the presentation.

Each Zoom and Microsoft Groups formally advocate split-tunneling VPN configurations and exemptions from TLS inspection to optimize efficiency. 

Zoom Desktop Egress Makes an attempt

Microsoft’s documentation explicitly states: “We advocate that Groups visitors bypasses proxy server infrastructure, together with SSL inspection.”

The assault helps a number of communication modes, together with SOCKS proxying, native and distant port forwarding, and may set up connections by means of WebSockets over HTTPS, DTLS-SRTP encrypted channels, and customized protocols over each TCP/443 and UDP/8801. 

Community visitors evaluation reveals normal WebRTC handshake processes with DTLS encryption, making malicious visitors indistinguishable from respectable conferencing information.

Mitigations

Safety specialists warn that conventional community monitoring approaches show ineffective towards Ghost Calls assaults. 

The analysis emphasizes that specializing in visitors quantity correlation or process-to-destination mapping yields excessive false constructive charges because of the respectable nature of the underlying protocols.

As a substitute, defenders ought to implement canary tokens to detect early enumeration actions and deal with figuring out proxied offensive instruments like Impacket or secretsdump.py reasonably than monitoring the communication channel itself. 

The assault’s sophistication lies in its capacity to mix seamlessly with enterprise-approved visitors patterns, making it a major concern for cybersecurity professionals.

The TURNt instrument has been launched as open-source software program, enabling safety researchers to higher perceive and develop countermeasures towards this rising menace vector.

Equip your SOC with full entry to the most recent menace information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Abuses, Attack, Calls, Command, Conferencing, Control, Covert, Ghost, Web

Post navigation

Previous Post: CISA Warns of ‘ToolShell’ Exploits Chain Attacks SharePoint Servers
Next Post: Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses

Related Posts

New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs Cyber Security News
Hackers Uses Social Engineering Attack to Gain Remote Access in 300 Seconds Hackers Uses Social Engineering Attack to Gain Remote Access in 300 Seconds Cyber Security News
Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program Cyber Security News
Android Zero-Click Flaw Allows Remote Access Android Zero-Click Flaw Allows Remote Access Cyber Security News
SURXRAT Android Malware Threatens Global Device Security SURXRAT Android Malware Threatens Global Device Security Cyber Security News
Signal App Clone TeleMessage Vulnerability May Leak Passwords; Hackers Exploiting It Signal App Clone TeleMessage Vulnerability May Leak Passwords; Hackers Exploiting It Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark