What is a C2 attack?
A command and control (C2) attack involves a compromised system, often referred to as a bot, being controlled remotely by an attacker through a C2 server. Through the server, the attacker communicates with a remote server and coordinates the attack, utilizing a backdoor for malicious tasks like data theft via DNS tunneling. If the malware spreads to other devices, the attacker can gain full control over the system.
Read more