Cyberattacks are always serious, but they become especially dire when an attacker can fully control systems within an organization. This “hands-on keyboard” access flips the script from wargaming to full-on acts of aggression.
In this blog series, we’re detailing every stage of the cyberattack lifecycle, the techniques used in them, and how you can defend against them. Before this, we discussed how attackers establish persistence through Installation. Now, we’re diving into one of the most nefarious stages, Command & Control, or C2.
Until now in the attack lifecycle, many of the attacker’s actions have been dedicated to laying preparations. In C2, the adversary acts directly, albeit remotely, on an organization’s systems. Building off credentials stolen, and backdoors created, the attacker begins by establishing a remote connection to the infected systems.
Adversaries use multiple techniques to port in from outside of an organization, including:
With a channel in place, attackers can begin the Command & Control stage in earnest:
This stage of the cyberattack lifecycle poses great threats to organizations. Here are a few solutions to identify and address active C2 events:
Understanding command and control and its impact on an organization is crucial for protecting against and preventing attackers within the network. Leveraging multiple solutions in tandem creates layers of protection in a defense-in-depth approach that makes it difficult and laborious for attackers to achieve their final goals.
Keep reading our blog to learn about each stage in the cyberattack lifecycle, and how a defense-in-depth approach helps you to prevent and defend against these new and emerging threats.