Skip to main content
The Agency.
Back to Cybersecurity Glossary

Resources

Command and Control (C&C)

Command And Control (C&C) infrastructure functions as the communication backbone cybercriminals use to remotely control compromised systems after initial exploitation. This infrastructure establishes covert bidirectional channels where attackers send commands to infected systems and receive stolen data in return.

Modern C&C systems operate as operational nerve centers for sophisticated cyber threats including advanced persistent threats, botnet management, and complex malware operations. C&C infrastructure allows attackers to maintain persistent access, execute commands, deploy additional payloads, and exfiltrate sensitive information while evading detection across enterprise networks.

How C&C Infrastructure Works

After initial compromise, malware installed on victim systems establishes communication with attacker-controlled C&C servers. This communication enables attackers to issue commands (executing additional malware, stealing data, launching attacks against other systems), receive exfiltrated information, update malware capabilities, and coordinate botnet activity.

C&C Communication Techniques

Attackers use various techniques to make C&C communications difficult to detect and block

Domain Generation Algorithms (DGAs): Malware uses algorithms to generate large numbers of domain names, making it difficult to block C&C communications by blacklisting specific domains.

Fast Flux: Rapidly changing DNS records associated with C&C domains complicate IP-based blocking.

Protocol Abuse: Attackers tunnel C&C communications through legitimate protocols (HTTP/HTTPS, DNS, SMTP) to blend with normal traffic.

Peer-to-Peer (P2P) C&C: Decentralized C&C architectures without single points of failure are more resilient to takedowns.

Living Off The Land: Using legitimate cloud services (GitHub, Twitter, Google Docs) as C&C channels exploits trusted platforms to evade detection.

Detection and Defense

Detecting C&C communications requires network traffic analysis, DNS monitoring, behavioral analytics, and threat intelligence feeds. Organizations should implement egress filtering, DNS security, and network segmentation to limit the ability of compromised systems to communicate with external C&C infrastructure.

Is your business cyber-ready?

Talk to our team about building a security posture that keeps attackers out.

Talk to our security team