Breaking Down the Real Meaning of an XDR Solution
Read More Discover effective anomaly detection algorithms to enhance your data analysis. Learn practical
Exclusive Webinar: Your NDR is not doing enough! Find out what you need to supercharge it!
To defeat the enemy, you must first disarm their ability to communicate.
Command and Control (C2) attacks remain one of the most persistent cybersecurity threats, enabling adversaries to communicate with compromised systems undetected. Attackers use C2 servers to send commands, exfiltrate data, and maintain long-term access to networks. These stealthy techniques allow them to deploy ransomware, steal sensitive information, and even conduct cyber espionage.
C2 attacks are getting sophisticated, often utilizing encrypted traffic and trusted cloud services like Google Drive and Microsoft OneDrive to avoid detection. According to IBM’s X-Force Threat Intelligence Index 2024, threat groups increasingly utilized C2 infrastructures, with campaigns like Hive0051 conducting over 1,000 active infections in just 24 hours through sophisticated DNS fluxing techniques. This underscores the urgency for organizations to detect and neutralize these infrastructures before attackers gain full control.
Detecting C2 traffic requires a multi-layered approach combining behavioral analytics, real-time network monitoring, and the identification of network anomalies. Detecting communication between command-and-control servers and compromised hosts is crucial for identifying these attacks. Here are the most effective detection strategies:
C2 malware often exhibits distinct network behaviors that deviate from normal traffic patterns. Security teams should look for:
For security teams to improve their defenses, they must incorporate up-to-date threat intelligence feeds into their security solutions. To detect known C2 domains, IP addresses, and malware hashes, these feeds offer malware signatures. Threat feeds from MITRE ATT&CK, AlienVault OTX, and Fidelis Threat Intelligence provide Indicators of Compromise (IOCs) to identify known C2 domains, IP addresses, and malware hashes.
Many C2 attacks bypass signature-based detection by using stolen credentials or legitimate software, making user behavior analytics essential. Security teams should:
DPI analyzes packet payloads to detect:
Many malware families use DGAs to generate random domain names for their C2 communications. Security teams can:
Once a C2 attack is detected, immediate and effective incident response is essential to prevent data exfiltration, ransomware deployment, or further lateral movement. The security team plays a crucial role here, ensuring that the organization remains protected from these threats.
Security teams should:
If an endpoint is infected:
NDR solutions continuously monitor network traffic for real-time threat detection. Fidelis Network® Detection and Response provides:
Stopping a C2 attack is one thing; knowing how they occur in the real world is another. Take a look at some high-profile incidents when attackers pulled the strings behind the scenes, causing havoc in their wake.
In May 2022, Cisco Systems experienced a cyberattack where an employee’s credentials were compromised through a phishing attack. The attackers, identified as UNC2447, Lapsus$, and Yanluowang, gained access to Cisco’s network using these credentials. They established C2 channels to exfiltrate data and maintain persistent access. Cisco’s security team detected the intrusion and implemented measures to contain and remediate the breach. This case highlights the importance of monitoring for unauthorized access and the need for swift incident response to disrupt C2 activities.
Operation Triangulation is a sophisticated cyber espionage campaign targeting iOS devices. Attackers used a chain of four zero-day vulnerabilities to deliver a malicious iMessage that executed code without user interaction. This allowed them to establish C2 channels, extract sensitive information, record conversations, and track geolocation. The malware operated solely in the device’s memory, making detection challenging and persistence possible even after reboots. This case underscores the advanced methods adversaries employ to establish C2 capabilities on mobile devices.
In April 2022, the Conti ransomware group launched a series of attacks on several Costa Rican government agencies. After the initial ransom demands were denied, the attackers widen their attack horizon, compromising multiple ministries and agencies. They used the C2 infrastructure to spread ransomware, encrypt data, and disrupt operations. The attack had widespread consequences, disrupting many public services and emphasizing on the need for governments to upgrade their defenses against C2-enabled ransomware attacks.
C2 attacks are those in which an adversary gains remote control over compromised systems in to facilitate data theft, malware execution, or network invasion. Attackers use remote access tools to take over compromised systems. When a compromised host communicates with the attacker’s server to receive commands, it can lead to network exploitation and data leaks.
Attackers infect a compromised machine with C2 malware via phishing, supply chain attacks, or drive-by downloads, which then communicates with attacker-controlled servers.
Traditional firewalls alone cannot effectively stop C2 attacks, as adversaries use encrypted or covert channels. C2 attacks are often part of advanced persistent threats (APTs) that use encrypted or covert channels. Advanced security tools like NGFWs and NDR solutions provide more effective defenses against these threats.
Fidelis NDR reduces dwell time and blocks C2 attacks before they escalate by continuously monitoring network traffic, detecting unusual activity, and automatically responding to threats. The security team can use Fidelis NDR to improve their efforts to prevent C2 attacks by training employees on recognizing and responding to these threats, adding to the organization’s overall safety and security.
Command and control attacks continues to be a major cybersecurity threat even in 2025. Building cyber resilience is critical for mitigating and recovering from C2 attacks. Threat intelligence, deep packet inspection, behavioral analytics, and NDR solutions can help security teams detect and stop these stealthy adversaries before they cause significant damage. Compromised hosts can be controlled to run commands from a C2 server, posing serious threats to an organization’s IT infrastructure.
Investing in Network Detection and Response (NDR) solutions like Fidelis Network® ensures proactive security, automated incident response, and advanced threat intelligence integration to stop C2 attacks in their tracks.
Sarika, a cybersecurity enthusiast, contributes insightful articles to Fidelis Security, guiding readers through the complexities of digital security with clarity and passion. Beyond her writing, she actively engages in the cybersecurity community, staying informed about emerging trends and technologies to empower individuals and organizations in safeguarding their digital assets.
See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.