Ghost Calls: How Hackers Exploit Microsoft Teams and Zoom for Stealth Attacks

Ghost Calls: How Hackers Exploit Microsoft Teams and Zoom for Stealth Attacks

Published: January 13, 2026

Duration: 13:02

In this eye-opening episode of TechDaily.ai, hosts David and Sophia uncover a sophisticated new cyberattack dubbed "ghost calls," where hackers exploit Microsoft Teams and Zoom communications to bypass corporate firewalls undetected. Dive deep into the delicate balance companies face between security and performance, and how the widely recommended split tunneling creates a hidden vulnerability. 
Learn how attackers leverage trusted infrastructure, like TURN relay servers, to create encrypted, uninspected tunnels that look like typical video calls but carry malicious command-and-control traffic. Discover how portable, long-lived credentials issued by Teams and Zoom become the key to these invisible attacks, a...