Hackers Exploit Microsoft Teams and Zoom for Stealth Attacks
Hackers use Microsoft Teams and Zoom to hide attacks. Learn how Ghost Calls work and how to stay protected.
Matilda
Hackers Exploit Microsoft Teams and Zoom for Stealth Attacks How Hackers Are Exploiting Microsoft Teams and Zoom to Evade Detection Cybercriminals are becoming increasingly sophisticated, and their latest tactic involves exploiting trusted communication platforms like Microsoft Teams and Zoom. These apps, widely used in business environments, are now being hijacked in a stealthy new method known as Ghost Calls . This technique allows attackers to bypass traditional security systems, making detection difficult. If you've searched for how hackers are using Microsoft Teams and Zoom to hide attacks, you're in the right place. Here’s what you need to know and how to stay one step ahead. Image : Google Ghost Calls: How the Attack Works Using Microsoft Teams and Zoom At the heart of this strategy is a method where hackers take advantage of TURN (Traversal Using Relays around NAT) servers—systems designed to support real-time communication through firewalls. Typically, when a user joins a video call, TURN credentials are temporarily generated. Attac…