What Is a Command and Control Cyberattack?

How Command and Control Attacks Are Structured

In the early days of the internet, attackers would have a physical server under their control, and they’d direct the attack from there. Today, many C2 attacks are directed from servers in the cloud.

Sometimes an attacker will use one server that the malware will send a message back to for instructions. This can be easily mitigated, since the C2 server’s IP address can be detected and blocked to prevent further communication. If an attacker uses proxies to mask their true IP address, however, defense becomes more difficult.

More commonly, scammers will use multiple servers to conduct an attack. It may be several servers running the same attack for redundancy in case one is taken down, or groups of servers arranged into a hierarchy.

Attackers can also instruct the infected computers in a botnet to act as a peer-to-peer (P2P) network, communicating with one another randomly instead of from a central server. This makes it harder to detect the infection’s origin. According to cybersecurity software manufacturer DNSFilter, this approach is often used together with a single-server attack — if the server gets taken down, the P2P option is there as a backup.

Search
  • There are no suggestions because the search field is empty.
Latest posts
Scary Security Stats: Roundup from 2024 Research Scary Security Stats: Roundup from 2024 Research

Each year, cybersecurity companies publish a number of research reports focusing on different aspects of cybersecurity and breach trends. Below is a list of some of the most alarming statistics from several reports published throughout the year from various companies.

{% module_block module "widget_6aeb08dc-4790-47de-a546-385b24cb0188" %}{% module_attribute "button_text" is_json="true" %}"READ MORE"{% end_module_attribute %}{...
DNSFilter Chief Data Scientist: Where we're going, we don't need (negative) labels DNSFilter Chief Data Scientist: Where we're going, we don't need (negative) labels

Have you ever tried to build a machine learning classifier where you only had labels for one of the classes?

Back to Basics: Why DNS is still foundational even as technology evolves Back to Basics: Why DNS is still foundational even as technology evolves

Almost every company is chasing the latest shiny object in an effort to be more competitive. The latest shiny object isAI, but before that, it was cloud, 5G, etc. The problem is that all of these new technologies also increase security risks — and the reality is that most organizations are ill-prepared for the existing security risks, let alone the new ones created by the addition of emerging technologies.

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.