Skip to main content

Command-and-Control Malware Traffic Playbook

Malicious actors operate command-and-control (C&C/C2) servers to interact with their victims’ computers. These C2 servers are intended to instruct the compromised PCs to do undesired things, such as stealing the user’s passwords, encrypting the files for ransom or attacking other computers on the network.


Read the full article on Demisto’s website

Share on LinkedInShare on FacebookTweet about this on TwitterPin on PinterestShare on Google+Share on RedditFlattr the authorEmail this to someone
Share This Post!


Founder of CryptoAUSTRALIA, privacy and info security enthusiast