Command-and-Control Malware Traffic Playbook

Malicious actors operate command-and-control (C&C/C2) servers to interact with their victims’ computers. These C2 servers are intended to instruct the compromised PCs to do undesired things, such as stealing the user’s passwords, encrypting the files for ransom or attacking other computers on the network.

The post Command-and-Control Malware Traffic Playbook appeared first on Rainbow and Unicorn.

This is a Security Bloggers Network syndicated blog post authored by Gabor. Read the original post at: Rainbow and Unicorn