A command-and-control (C2) server is a main tool cyber threat actors have in their arsenal to launch and control cyber attacks. Threat actors use C2s to send commands to their malware and to distribute malicious programs, malicious scripts, and more. They also use them to receive stolen data that they exfiltrated from target servers, devices, websites, and forms. In short, C2s are the technical brain behind a threat actor’s malicious operations.
What is a Command-and-Control (C2) Server?
Free Assessment
Security for Everyone that Visits Your Website
Find out if your web application is hiding vulnerable, malicious, or dangerous code that could damage your customers and your business. No payment information required.