c2 operations 1 Ghost Calls: How Cybercriminals Exploit Zoom and Microsoft Teams for Covert C2 Operations Aug 6, 2025