The processes and tools behind a true APT campaign: Command & Control

In this stage of the APT campaign, attackers have infiltrated the network and are beginning to work toward their endgame

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, exploitation and installation, and exfiltration.

In part four of a series on understanding the processes and tools behind an APT-based incident, CSO examines the Command & Control phase, often referred to as C2. During this phase, the attacker(s) are on the network, and depending on their objectives, will start focusing on their endgame.

[Cybercriminals increasingly use the Tor network to control botnets, researchers say]

To continue reading this article register now

Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.