Command and control (C2) is the stage where the attacker establishes communication with the compromised system to control it remotely. During this stage, the attacker sends commands to the compromised system to perform malicious activities and exfiltrate data.
Learn More
AI Generated Content may display inaccurate information, always double-check anything important.
What is Command and Control (C2) in cybersecurity?
Why is the C2 stage critical in the cyber kill chain?
What tools do attackers typically use for Command and Control?