What Is a Command and Control Cyberattack?

How Command and Control Attacks Are Structured

In the early days of the internet, attackers would have a physical server under their control, and they’d direct the attack from there. Today, many C2 attacks are directed from servers in the cloud.

Sometimes an attacker will use one server that the malware will send a message back to for instructions. This can be easily mitigated, since the C2 server’s IP address can be detected and blocked to prevent further communication. If an attacker uses proxies to mask their true IP address, however, defense becomes more difficult.

More commonly, scammers will use multiple servers to conduct an attack. It may be several servers running the same attack for redundancy in case one is taken down, or groups of servers arranged into a hierarchy.

Attackers can also instruct the infected computers in a botnet to act as a peer-to-peer (P2P) network, communicating with one another randomly instead of from a central server. This makes it harder to detect the infection’s origin. According to cybersecurity software manufacturer DNSFilter, this approach is often used together with a single-server attack — if the server gets taken down, the P2P option is there as a backup.

Search
  • There are no suggestions because the search field is empty.
Latest posts
DNSFilter Achieves Remarkable Growth in Channel Partnerships DNSFilter Achieves Remarkable Growth in Channel Partnerships

In a bold move to strengthen its foothold in the cybersecurity sector, DNSFilter recently announced a substantial expansion of its channel partner network. The year 2024 marks a pivotal moment as the company reported a remarkable 40% increase in channel-driven Annual Recurring Revenue (ARR), responding to a heightened demand for robust and efficient DNS protection worldwide.

{% module_block module "widget_288ac331-8c1a-414f-ba25-121bcd1db270" %}{...
DNSFilter 2025 Predictions: Cybersecurity in 2025 - Four Predictions on What's Needed to Stay Secure DNSFilter 2025 Predictions: Cybersecurity in 2025 - Four Predictions on What's Needed to Stay Secure

Better, more robust cybersecurity is not a new need for today's digital organizations; it's a perennial one. What's new are the particular challenges these organizations face due to the advent of AI technologies and hybrid work models, among other changes. Such realities call for not just new tools but new ways of thinking. Securing modern businesses is a matter of staying updated on the latest threats, updating tools and looking at security from...

DNSFilter Grows Channel Revenue by 40% and Expands Channel Partner Network in 2024 DNSFilter Grows Channel Revenue by 40% and Expands Channel Partner Network in 2024

Fostering Channel Partner Growth Through Major Initiatives

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.