At TecnetOne, we stay alert to new tactics cyber attackers use to bypass defenses. Today, we want to highlight a lesser-known yet ingenious threat: Ghost Calls.
This technique doesn’t exploit a vulnerability. Instead, it abuses trusted video conferencing protocols — like Zoom and Microsoft Teams — to conceal malicious traffic. Yes, you read that right: your everyday collaboration tools may be used to camouflage command-and-control (C2) operations.
Here’s how the tactic works, the risks it poses, and what you can do to secure your business environment.
Ghost Calls is a post-exploitation evasion technique that uses TURN (Traversal Using Relays around NAT) servers — commonly found in tools like Zoom and Teams — to create encrypted channels between the attacker and the compromised system.
Instead of launching direct attacks, adversaries use legitimate video conferencing infrastructure as a communication tunnel, staying completely under the radar.
“Malicious traffic is disguised as just another online meeting.”— Research summary by Adam Crosser, presented at Black Hat USA 2025
TURN is a protocol used in VoIP, WebRTC, and video calls. It enables devices behind firewalls (like most corporate networks) to establish connections.
When you join a Zoom or Teams meeting, your device obtains temporary TURN credentials to route audio and video.
Ghost Calls reuses those credentials to create a secure WebRTC tunnel between the compromised device and the attacker.
That encrypted tunnel can be used to:
All of this traffic passes through legitimate Zoom or Teams domains and IP addresses, which makes it nearly invisible to firewalls or proxies.
Local port forwarding via Ghost Calls (Source: Praetorian)
Ghost Calls takes advantage of tools and services you already use and trust, giving attackers multiple advantages:
Compared to traditional C2 methods (often slow and noisy), Ghost Calls is stealthy, fast, and highly effective.
Researcher Adam Crosser from Praetorian developed an open-source tool called TURNt, available on GitHub, to demonstrate this technique.
TURNt consists of two components:
With this setup, attackers can:
Learn more: North Korean Hackers Use Deepfakes on Zoom to Infect Macs
Not exactly. Ghost Calls doesn’t exploit a vulnerability in the software. Instead, it abuses the normal design and trust model of these platforms.
It’s a trust abuse tactic: the attacker leverages tools already allowed and enabled on your network to move laterally without raising suspicion.
Both Zoom and Microsoft were contacted for comment. As of publication time, no public response has been issued.
In a corporate environment, Ghost Calls can have severe consequences if you’re not prepared:
And all this can occur even if you have firewalls, EDRs, and proxies in place, because Ghost Calls hides behind legitimate-looking traffic.
SOCKS proxying on TURNt (Source: Praetorian)
At TecnetOne, we recommend a combination of technical and operational controls to defend against this advanced tactic:
Restrict WebRTC usage to authorized devices and users, especially if not everyone needs it for their role.
Inventory all TURN and STUN servers allowed in your network. Block any that don’t come from trusted providers.
Traditional monitoring tools won’t catch this. Use behavioral detection solutions that can identify suspicious traffic — even when encrypted and using legitimate domains.
Look for meetings initiated after hours, with no visible participants, or from unusual locations.
Implement policies where every request (even over trusted channels) is validated by context: user, device, location, and behavioral patterns.
Also of interest: Microsoft Teams: April 2025 News and Updates
Ghost Calls is a prime example of how attackers now target trust instead of code.
Instead of finding bugs, they infiltrate the very tools you rely on for daily communication.
That’s why a modern cybersecurity strategy must include:
Protecting your business is no longer just about having antivirus software. It’s about understanding how modern attackers operate — and staying one step ahead with smart, proactive defenses.