What Is a Command and Control Cyberattack?

How Command and Control Attacks Are Structured

In the early days of the internet, attackers would have a physical server under their control, and they’d direct the attack from there. Today, many C2 attacks are directed from servers in the cloud.

Sometimes an attacker will use one server that the malware will send a message back to for instructions. This can be easily mitigated, since the C2 server’s IP address can be detected and blocked to prevent further communication. If an attacker uses proxies to mask their true IP address, however, defense becomes more difficult.

More commonly, scammers will use multiple servers to conduct an attack. It may be several servers running the same attack for redundancy in case one is taken down, or groups of servers arranged into a hierarchy.

Attackers can also instruct the infected computers in a botnet to act as a peer-to-peer (P2P) network, communicating with one another randomly instead of from a central server. This makes it harder to detect the infection’s origin. According to cybersecurity software manufacturer DNSFilter, this approach is often used together with a single-server attack — if the server gets taken down, the P2P option is there as a backup.

Search
  • There are no suggestions because the search field is empty.
Latest posts
Podcast Appearance: Facing Cyberthreats and Misinfo in a Tense Political Climate Podcast Appearance: Facing Cyberthreats and Misinfo in a Tense Political Climate

In this episode of DOS Won’t Hunt, Eric Wenger, senior director for cyber and emerging tech policy with Cisco; Roman Arutyunov, co-founder and senior vice president of products with Xage Security; Dennis Dayman, CISO with Code42; TK Keanini, CTO with DNSFilter; and Akash Agarwal, director of engineering and DevSecOps with LambdaTest, discuss ways to address possible cyber threats and misinformation in the workplace during this intensely partisan ...

Public Wi-Fi is table stakes, and unsecured Wi-Fi is risky business Public Wi-Fi is table stakes, and unsecured Wi-Fi is risky business

While public Wi-FI can be very convenient, both for users and providers, it also introduces a number of security challenges. Unsecured or under-secured public Wi-Fi networks can expose users to cyber threats like identity theft, financial fraud and data breaches. Once they are connected, attackers can monitor all traffic, extract sensitive data, and even inject and spread malware.

CIO Influence Interview with TK Keanini, CTO of DNSFilter CIO Influence Interview with TK Keanini, CTO of DNSFilter

TK is a leader in technical innovation, specializing in the identification and protection of intellectual properties. With a background in game development and information security, he balances design’s social and technical aspects. Known for his ability to acquire top talent and build high-performing teams at DNSFilter.

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.