Microsoft and Zoom teams can be kidnapped to give hackers the keys to your kingdom




  • Experts say that Microsoft and Zoom teams are perfect to hide ghost calls
  • Attackers can obtain temporary rotation credentials and create a tunnel
  • Suppliers must implement safeguards, because there are no vulnerabilities in view

Praetorian researchers have thrown light on ghost calls, a technique of evasion of command and control after the exploitation that sends attackers trafficking through a legitimate route using relays around the NAT (Turn) servers used by the equipment such as Zoom and Microsoft, to evade the detection.

The attack works by kidnapping temporary turn credentials received by conference calls when they join a meeting, and then establishing a tunnel between the committed host and the attacker’s machine.

Leave a Comment

Your email address will not be published. Required fields are marked *