A command-and-control server (C&C server) is a computer that issues directives to digital devices that have been infected withrootkits or other types of malware, such asransomware. C&C servers can be used to create powerful networks of infected devices capable of carrying out distributed denial-of-service (DDoS) attacks, stealing data, deleting data or encrypting data in order to carry out an extortion scheme.
In the past, a C&C server was often under an attacker's physical control and could remain active for several years. Today, C&C servers generally have a short shelf life; they often reside in legitimate cloud services and use automateddomain generation algorithms to make it more difficult for law enforcement and ethical malware hunters to locate them.
For a C&C attack to materialize, a malicious remote server known as a C&C server must gain a foothold into an already infected machine. Most devices such as laptops, desktops, tablets, smartphones andIoT devices are vulnerable to this type of attack.
Command-and-control server attacks are typically carried out through the following channels:
After the successful invasion of a device, a threat actor establishes communication with the malicious C&C server to send instructions to the infected host and form a malicious network. A malicious network under a C&C server's control is called abotnet and thenetwork nodes that belong to the botnet are sometimes referred to as zombies. Beaconing can also be used between the infected device and the C&C server to deliver instructions or additionalpayloads.
Once the infected host starts executing the commands sent by the C&C server, further malware is installed, which gives the threat actor full control over the compromised machine. To avoid detection by firewalls, threat actors might try to blend C&C traffic with other types of legitimate traffic, including HTTP,HTTPS or domain name system.
Even withcybersecurity and threat intelligence mechanisms in place, organizations may not always effectively monitor outbound communications. This may let certain outbound communication channels -- including phishing emails,lateral movements or infected websites -- weave their way into a network and inflict damage.
C&C servers act as the headquarters where all activities related to the targeted attack report back. Besides installing malware, a threat attacker may use a C&C server to carry out the following malicious activities:
A botnet is a group of malware-infected andinternet-connected bots that are controlled by a threat actor. Most botnets have a centralized command-and-control architecture, although peer-to-peer (P2P) botnets are on the rise due to their decentralized nature, which offers more control to the threat actors.
Popular botnet topologies include the following:
In a traditional botnet, the bots are infected with aTrojan horse and use Internet Relay Chat (IRC) to communicate with a central C&C server. These botnets are often used to distribute spam or malware and gather misappropriated information, such as credit card numbers. Since IRC communication is typically used to command botnets, it's often guarded against. This has motivated cybercriminals to find more covert ways for C&C servers to issue commands. Alternative channels used for botnet commands include JPEG images, Microsoft Word files and posts from LinkedIn or Twitter dummy accounts.
Botnets can fuel DDoS attacks by taking advantage of IoT vulnerabilities. Learn howhackers create an IoT botnet and initiate a DDoS attack to infect networks.
Succession planning is the strategic process of identifying and developing internal candidates to fill key organizational roles to ensure business continuity and the availability of effective leadership in the face of role transitions, departures or unforeseen events. See More.
Multi-access edge computing (MEC) is a network architecture concept that brings cloud computing capabilities and IT services ...
Fifth-generation wireless or 5G is a global standard and technology for wireless and telecommunications networks.
A small cell is a type of low-power cellular radio access point or base station that provides wireless service within a limited ...
No longer just a good idea, IAM is a crucial piece of the cybersecurity puzzle. It's how an organization regulates access to ...
Data masking is a security technique that modifies sensitive data in a data set so it can be used safely in a non-production ...
Antivirus software (antivirus program) is a security program designed to prevent, detect, search and remove viruses and other ...
A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...
User-generated content (UGC) is published information that an unpaid contributor provides to a website.
Business process outsourcing (BPO) is a business practice in which an organization contracts with an external service provider to...
Succession planning is the strategic process of identifying and developing internal candidates to fill key organizational roles ...
Compensation management is the discipline and process for determining employees' appropriate pay, incentives, rewards, bonuses ...
HR technology (human resources tech) refers to the hardware and software that support an organization's human resource management...
A virtual agent is an AI-powered software application or service that interacts with humans or other digital systems in a ...
Customer acquisition cost (CAC) is the cost associated with convincing a consumer to buy your product or service, including ...
Direct marketing is a type of advertising campaign that seeks to elicit an action (such as an order, a visit to a store or ...
