Command and Control
Also known as: C2, C&C, Command-and-control server
The infrastructure an attacker uses to send instructions to, and receive data from, malware-infected hosts in a botnet or targeted intrusion.
Last updated:
What is command and control?
Command and control — typically abbreviated C2 or C&C — is the back-channel between a compromised host and the attacker who controls it. After malware runs on a victim's machine, it needs a way to receive orders ("upload this file", "encrypt the disk", "launch a DDoS") and to send stolen data back. The servers, domains, protocols, and channels used for that back-channel are collectively the C2 infrastructure.
How C2 traffic is structured
Most modern C2 frameworks use HTTPS on port 443, which blends in with normal web traffic and usually passes through corporate firewalls without inspection. Stealthier variants hide C2 inside DNS queries, Slack/Discord/Telegram webhooks, GitHub issue comments, or traffic shaped to mimic a specific SaaS API. Infected hosts typically beacon on a schedule — every 60 seconds, every 5 minutes — to check for new instructions, and the timing of those beacons is one of the most reliable detection signals.
Why C2 hosts appear on abuse lists
C2 infrastructure is quickly identified and published by threat researchers, honeypots, and EDR vendors. A single malware campaign's C2 domains and IPs are usually listed on multiple public blocklists within hours or days of the campaign going live. Blocking outbound traffic to known C2 hosts at the firewall breaks the infection's ability to act, even if the initial malware sample has not been detected. Running a suspicious destination IP through an IP abuse report checker will surface existing C2 reports.
C2 for rent
Commercial DDoS-as-a-service platforms are essentially packaged C2 for botnets — they abstract the C2 layer behind a web dashboard so customers without technical skill can rent attack capacity by the minute.