A Command and Control (C2) attack occurs when hackers create hidden communication channels between a malware-infected device and their own server, allowing them to remotely control compromised systems, steal data, and carry out malicious activities over extended periods.
Attackers plant malware that secretly connects to their servers using disguised protocols like HTTPS or DNS. Once infected, devices become "zombies" that phone home for instructions, allowing hackers to remotely deploy additional threats, steal data, and spread laterally across networks. When multiple systems are compromised, the attacker's server controls an entire botnet of infected machines.
C2 infrastructure gives attackers persistent remote control over compromised systems, enabling them to steal credentials, exfiltrate sensitive data, move laterally across networks, deploy ransomware, recruit machines into botnets, and cause operational disruptions all while maintaining a constant backdoor to strike whenever they choose.
In May 2025, the U.S. Department of Justice, Microsoft, and international partners dismantled the LummaC2 infostealer operation, seizing critical command-and-control domains that had been stealing credentials from hundreds of thousands of infected systems worldwide, effectively severing the malware's communication channels and crippling its ability to operate.
SourceGet our entire attack repository in a single, offline-ready PDF guide, featuring 25+ real-world attacks.
See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central.
Read moreDiscover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months.
Read moreGet a clear, practical guide to understanding threats and strengthening your organization’s security.
Read more