‘Ghost Calls’ Attack Exploits Web Conferencing as Hidden Command-and-Control Channel

‘Ghost Calls’ Attack Exploits Web Conferencing as Hidden Command-and-Control Channel

Security researchers have unveiled a sophisticated new attack technique called “Ghost Calls” that exploits popular web conferencing platforms to establish covert command-and-control (C2) channels, effectively turning trusted business communication tools into hidden pathways for cybercriminals. The technique, presented by Adam Crosser from Praetorian at Black Hat USA 2025, demonstrates how attackers can abuse the TURN […]

The post ‘Ghost Calls’ Attack Exploits Web Conferencing as Hidden Command-and-Control Channel appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

​The original article found on GBHackers Security | #1 Globally Trusted Cyber Security News Platform Read More