A novel attack technique dubbed “Ghost Calls” has emerged, exploiting web conferencing platforms like Zoom, Microsoft Teams, and Google Meet to create covert command and control (C2) channels. This sophisticated method allows attackers to bypass traditional network security measures, making it a significant concern for cybersecurity professionals. Root Cause The Ghost Calls attack leverages the […]
The post Ghost Calls: Stealthy C2 Attack Exploits Zoom, Teams, and Meet appeared first on SecPod Blog.