Optiv Cybersecurity Dictionary

What is C2 - Command and Control?

Command and control (C2) is often used by attackers to retain communications with compromised systems within a target network.

 

They then issue commands and controls to compromised systems (as simple as a timed beacon, or as involved as remote control or data mining). It's usually the compromised system/host that initiates communication from inside a network to a command and control server on the public internet. Establishing a command and control link is often the primary objective of malware.


Contact Us

 

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?