New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control

A sophisticated new attack technique called “Ghost Calls” exploits web conferencing platforms to establish covert command and control (C2) channels.  Presented by Adam Crosser from Praetorian at Black Hat USA 2025, this groundbreaking research demonstrates how attackers can leverage the TURN protocol and legitimate conferencing infrastructure to bypass network security measures. Key Takeaways1. TURNt tool […]

The post New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: