C2 - Command and Control Home Cybersecurity Dictionary C2 - Command and Control C2 is often used by attackers to retain communications with compromised systems within a target network. They then issue commands and controls to compromised systems (as simple as a timed beacon, or as involved as remote control or data mining). It is usually the compromised system/host that initiates communication from inside a network to a command and control server on the public Internet. Establishing a command and control link is often the primary objective of malware. Related TermsAPT - Advanced Persistent ThreatsRansomwareDDoS - Distributed Denial of Service Share: Seeking Clarity? View the Cybersecurity Dictionary for top terms searched by your peers. Back to the Dictionary RELATED INSIGHTS BLOG April 03, 2018 Escape and Evasion Egressing Restricted Networks – Part 2 Attackers and security assessors alike are utilizing a technique called domain fronting, which masks malicious command and control (C2) traffic. This ... See Details Read more about Escape and Evasion Egressing Restricted Networks – Part 2 BLOG January 25, 2017 Escape and Evasion Egressing Restricted Networks A command kill chain consists of payload delivery, code execution on a target system, and establishing a command and control (C2) channel outside of a... See Details Read more about Escape and Evasion Egressing Restricted Networks How Can We Help? Let us know what you need, and we will have an Optiv professional contact you shortly.