Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control

Posted on August 7, 2025August 7, 2025 By CWS

A classy new assault approach known as “Ghost Calls” exploits internet conferencing platforms to determine covert command and management (C2) channels. 

Introduced by Adam Crosser from Praetorian at Black Hat USA 2025, this groundbreaking analysis demonstrates how attackers can leverage the TURN protocol and legit conferencing infrastructure to bypass community safety measures.

Key Takeaways1. TURNt instrument exploits the TURN protocol from Zoom/Groups/Meet to create hidden command & management channels.2.  Makes use of respectable conferencing ports and advantages from company TLS inspection exemptions3. Encrypted visitors seems equivalent to regular video calls, defeating conventional community monitoring

The assault makes use of a newly developed instrument known as TURNt (TURN tunneler), which abuses the TURN (Traversal Utilizing Relays round NAT) protocol generally utilized by internet conferencing functions. 

TURN servers, important for WebRTC communications, allow peer-to-peer connections by means of firewalls and NAT gadgets. 

The instrument targets explicitly main platforms, together with Zoom (55.91% market share), Microsoft Groups (32.29%), and Google Meet (5.52%).

TURNt operates by acquiring TURN credentials from respectable internet conferencing classes, which usually stay legitimate for a number of days. These credentials use the format:

The assault leverages normal ports like 443/TCP for TLS connections and 8801/UDP for media visitors, making detection extraordinarily difficult as this visitors seems equivalent to respectable video conferencing.

What makes Ghost Calls significantly insidious is the way it exploits safety suggestions from conferencing suppliers themselves, reads the presentation.

Each Zoom and Microsoft Groups formally advocate split-tunneling VPN configurations and exemptions from TLS inspection to optimize efficiency. 

Zoom Desktop Egress Makes an attempt

Microsoft’s documentation explicitly states: “We advocate that Groups visitors bypasses proxy server infrastructure, together with SSL inspection.”

The assault helps a number of communication modes, together with SOCKS proxying, native and distant port forwarding, and may set up connections by means of WebSockets over HTTPS, DTLS-SRTP encrypted channels, and customized protocols over each TCP/443 and UDP/8801. 

Community visitors evaluation reveals normal WebRTC handshake processes with DTLS encryption, making malicious visitors indistinguishable from respectable conferencing information.

Mitigations

Safety specialists warn that conventional community monitoring approaches show ineffective towards Ghost Calls assaults. 

The analysis emphasizes that specializing in visitors quantity correlation or process-to-destination mapping yields excessive false constructive charges because of the respectable nature of the underlying protocols.

As a substitute, defenders ought to implement canary tokens to detect early enumeration actions and deal with figuring out proxied offensive instruments like Impacket or secretsdump.py reasonably than monitoring the communication channel itself. 

The assault’s sophistication lies in its capacity to mix seamlessly with enterprise-approved visitors patterns, making it a major concern for cybersecurity professionals.

The TURNt instrument has been launched as open-source software program, enabling safety researchers to higher perceive and develop countermeasures towards this rising menace vector.

Equip your SOC with full entry to the most recent menace information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Abuses, Attack, Calls, Command, Conferencing, Control, Covert, Ghost, Web

Post navigation

Previous Post: CISA Warns of ‘ToolShell’ Exploits Chain Attacks SharePoint Servers
Next Post: Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses

Related Posts

IT Giant Ingram Micro Restores Operations Following Ransomware Attack Cyber Security News
Authorities Busted Ransomware Gang – Nine Laptops and 15 Mobile Devices Were Seized Cyber Security News
Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows Cyber Security News
Halo Security Achieves SOC 2 Type 1 Compliance Cyber Security News
VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code Cyber Security News
Dark Web Travel Agencies Offering Cheap Travel Deals to Steal Credit Card Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others
  • SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability
  • SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability
  • ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub
  • Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others
  • SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability
  • SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability
  • ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub
  • Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News