A powerful new method of short-term covert command-and-control (C2) using mainstream web-conferencing services.
Dubbed “Ghost Calls,” this technique repurposes real-time communication protocols—built for low-latency audio and video streaming—as a high-bandwidth, interactive C2 channel that seamlessly blends into an organization’s normal network traffic.
At Black...