Command and Control (C2 / C&C) Server

A Command and Control (C2 / C&C) Server is a centralized infrastructure used by threat actors to send instructions to systems compromised by malware, such as Infostealers, and to receive the data exfiltrated from those infected devices.

What is a Command and Control (C2) Server in Cyber Security?

In the lifecycle of a cyberattack, the Command and Control (C2) Server acts as the brain of the entire operation. Once an Infostealer successfully infiltrates a target device, it relies on the C2 infrastructure to transmit harvested credentials, session tokens, and sensitive files back to the attacker.


How Infostealers Communicate with C2 Infrastructure

The communication between the infected host and the C2 server is often stealthy and encrypted to avoid detection by firewalls. This relationship involves several key functions:

  1. Data Exfiltration: The primary goal where the infostealer uploads stolen "logs" to the server.
  2. Beaconing: Periodic signals sent by the malware to the C2 to confirm it is still active and ready for instructions.
  3. Remote Execution: Attackers can send specific commands to the malware, such as capturing screenshots or installing additional payloads like ransomware.


The Importance of C2 Detection in Defense

Neutralizing a C2 connection is one of the most effective ways to stop a data breach in progress. If the link to the Command and Control center is severed, the malware becomes isolated, preventing the stolen data from reaching the criminal’s hands. Dark Radar platforms proactively track the IP addresses and domains associated with C2 infrastructures to alert organizations of active infections within their perimeter.


C2 Analysis in Vulnerability Assessments

Modern vulnerability assessments prioritize identifying C2 communication patterns. By analyzing where the malware is "talking" to, security teams can identify the specific threat actor group involved and understand the broader scope of the campaign.


In summary; Command and Control (C2) servers are the operational hubs for cybercrime. Identifying and blocking these servers is a critical step in dismantling complex infostealer operations and protecting organizational data.