Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The map that takes you to the release release date: when and where to see it online?

    August 6, 2025

    Disney Hulu is closing the app – what customers should know here

    August 6, 2025

    Gartner’s AI propaganda cycle shows that AI technology is at its peak – but will it do?

    August 6, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»New ghosts for C2 operations misused strategy and call Microsoft teams
    Security

    New ghosts for C2 operations misused strategy and call Microsoft teams

    PineapplesUpdateBy PineapplesUpdateAugust 6, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    New ghosts for C2 operations misused strategy and call Microsoft teams
    Share
    Facebook Twitter LinkedIn Pinterest Email

    New ghosts for C2 operations misused strategy and call Microsoft teams

    A new post-exclusion command-end-control (C2) stolen method called ‘Gost Call’ Abuse Turn Server used by apps used by conferencing apps such as zoom and microsoft teams for tunnel traffic through reliable infrastructure.

    Ghost Call uses valid credentials, webrtc and custom tooling to bypass most existing defense and anti-anti-use measures, without relying on an exploitation.

    This new strategy was presented praetorianSecurity Researcher Adam Crosser at Black Hat USA, where it was revealed that new technology can be used by red teams when penetrated emulation exercises.

    “We take advantage of the web conferencing protocol, which are designed for real-time, low-oppression communication and operated through the globally distributed media server that act as a natural traffic relay,” Presents briefing reads,

    “This approach allows operators to blend the interactive C2 sessions in the normal venture traffic patterns, which temporarily appears as nothing more than the online meeting.”

    How does ghost call works

    Turn (traverse using relay around NAT) is a networking protocol that is commonly used by video calls, VOIPs, and WebrtC services that help to communicate the devices behind the NAT firewall when a direct connection is not possible when a direct connection is not possible.

    When a zoom or team client joins a meeting, he receives temporary turn credentials that ghost calls may kidnap to install a turn-based Webrtc tunnel between the attacker and the victim.

    This tunnel can be used to proxy the proxy data or C2 traffic, which is in the form of regular video conferencing traffic through a reliable infrastructure used by zoom or teams.

    Since traffic is rooted through valid domains and IPs that are widely used in the enterprise, malicious traffic firewalls, proxies and TLS can bypass inspection. Additionally, Webrtc traffic has been encrypted, so it is well hidden.

    By misusing these devices, the attackers also avoid highlighting their own domains and infrastructure by enjoying high performance, reliable connectivity and adaptability to use both UDP and TCP on port 443.

    In comparison, traditional C2 mechanisms are slow, specific, and often lack the VNC operations facilitates the real -time exchange capabilities required to facilitate the operation.

    Local port forward through ghost call
    Local port forward through ghost call
    Source: Pratorian

    Turnat-IT

    Crosser’s research ended with the development of a custom open-source (Available on github) Utility called ‘Turnat’ can be used for tunling C2 traffic through zoom and Webrtc Turn server provided by teams.

    Turnat consists of two components, namely a controller moving towards the attacker, and a relay posted on a compromised host.

    The controller runs a sox proxy server to accept the tunled connection through turn. The relay connects back to the controller using the turn credential, and sets a webrtc data channel through the provider’s turn server.

    Proxing on socks turn
    Proxing on socks turn
    Source: Pratorian

    Turnat socks can facilitate proxy, local or remote port forwarding, data exfoliation, and hidden VNC (virtual network computing) traffic tunling.

    Although Ghost Call Zoom or Microsoft does not take advantage of any weaknesses in teams, Bleepingcomputer has approached both vendors whether they plan to introduce additional safety measures to reduce their viability. We will update this post once, when we either receive the response.


    Picus Red Report 2025

    Malware targeting password stores increased 3x as the attackers secretly carried out the perfect history landscape, infiltrated and exploited important systems.

    Search for the top 10 Metter Att & CK techniques behind the 93% attacks and how to defend them.

    call ghosts Microsoft misused operations Strategy teams
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWant a different type of work trip? Try a robot hotel
    Next Article This wall-mounted smart calendar is a game changer in my house (and it’s $ 50 off)
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Akira Rainmware misused CPU tuning tool to disable Microsoft defender

    August 6, 2025
    Security

    How not a North Korean to spy it

    August 6, 2025
    Security

    My new favorite kitchen holder can carry up to 14 keys (and is trackable by phone)

    August 6, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    The map that takes you to the release release date: when and where to see it online?

    August 6, 2025

    Disney Hulu is closing the app – what customers should know here

    August 6, 2025

    Gartner’s AI propaganda cycle shows that AI technology is at its peak – but will it do?

    August 6, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.