A powerful new method of short-term covert command-and-control (C2) using mainstream web-conferencing services. Dubbed “Ghost Calls,” this technique repurposes real-time…