Microsoft teams and zoom can be diverted to give hackers the keys to your kingdom


  • Experts say that Microsoft and Zoom teams are perfect for hiding ghost calls
  • Attackers can obtain temporary turn references and create a tunnel
  • Suppliers must implement guarantees, as there are no vulnerabilities in view

Praetorian researchers have enlightened ghost calls, a post-exploitation command and control technique that sends attacker traffic through a legitimate crossing using relays around NAT (Tour) servers used by Zoom and Microsoft teams, to escape detection.

The attack operates by diverting the temporary identification information of turn that conference calls receive when they join a meeting, then by establishing a tunnel between the compromised host and the attacker’s machine.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top