Microsoft -hold and Zoom can be hijacked to give hackers the keys to your kingdom


  • Experts say that Microsoft -hold and Zoom are perfect for hiding ghost calls
  • Attackers can get temporary reversal and create a tunnel
  • Sellers need to implement protective measures because there are no vulnerabilities in sight

Researchers from Praetorian have shed the light at Ghost Calls, a detention command-and-control-evaluation technique that sends striker traffic through legitimate review using relays around night (turn) servers used by zoom and Microsoft teams to avoid detection.

The attack works by hijacking the temporary credentials that conferences receive when attending a meeting, and then establishing a tunnel between the compromised host and the striker’s machine.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top