A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly ingest data from on-prem, cloud or hybrid environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Identity Security
    • Singularity Identity
      Identity Threat Detection and Response
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-class Expertise and Threat Intelligence.
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive solutions for seamless security operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your go-to source for our top partners in your region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
Background image for What are Command & Control (C2) Servers?
Cybersecurity 101/Threat Intelligence/Command & Control (C2) Servers

What are Command & Control (C2) Servers?

Command and Control (C2) servers orchestrate cyber attacks. Understand their role in malicious operations and how to disrupt them.

CS-101_Threat_Intel.svg
Table of Contents

Related Articles

  • What Is Predictive Threat Intelligence? How AI Helps Anticipate Cyber Threats
  • Cyber Threat Intelligence Lifecycle
  • What Is Behavioral Threat Detection & How Has AI Improved It?
  • What is Fileless Malware? How to Detect and Prevent Them?
Author: SentinelOne
Updated: August 13, 2025

Command and Control (C2) servers are used by attackers to communicate with compromised systems. This guide explores how C2 servers operate, their role in cyber attacks, and strategies for detection and mitigation.

Learn about the importance of monitoring network traffic to identify C2 communications. Understanding C2 servers is crucial for organizations to enhance their cybersecurity defenses.

Command and Control - Featured Image | SentinelOne

A Brief Overview & History of Command & Control (C2)

C2 servers, also known as C&C servers or C2 nodes, serve as the linchpin of cyberattacks, allowing threat actors to remotely manage and coordinate their malicious operations. The concept of C2 servers has evolved significantly since its inception, shaping the landscape of cyber threats and the strategies used to combat them.

C2 servers first emerged in the early days of computer networks when malicious hackers recognized the need for centralized control over their activities. They initially served as a means to manage and deploy malware, enabling attackers to maintain persistent access to compromised systems. These servers acted as a conduit for stolen data, provided instructions to infected devices, and facilitated the exfiltration of sensitive information.

In the current cybersecurity landscape, C2 servers have become much more sophisticated and versatile. They are instrumental in orchestrating a wide range of cyberattacks, from Distributed-Denial-of-Service (DDoS) assaults to data breaches and the proliferation of ransomware. Modern C2 infrastructure often employs encryption and obfuscation techniques to conceal communication channels, making detection and attribution a challenging endeavor for defenders.

Understanding How Command & Control (C2) Works

C2 systems serve as a vital component in cyberattacks, allowing malicious actors to maintain control over compromised devices, exfiltrate data, and execute further stages of their malicious campaigns.

C2 Server Setup

The C2 infrastructure begins with the establishment of C2 servers, which are often distributed across multiple locations and hosted on compromised or anonymous servers to evade detection. Threat actors typically employ domain generation algorithms (DGA) to generate a large number of domain names. This approach helps them avoid blacklisting and tracking by security solutions.

Initial Compromise

The process often begins with an initial compromise, such as a successful phishing attack, exploiting vulnerabilities, or the installation of malware through infected files or links. Malicious software, often referred to as a “bot” or “agent,” is installed on the victim’s device, allowing the threat actor to gain control.

Callback Mechanism

Once the agent is installed, it establishes a connection to the C2 server. This connection is often referred to as a ‘callback’. The callback is usually initiated through a predefined protocol, often using standard network ports and protocols (HTTP, HTTPS, DNS, or even ICMP).

Command and Control Channel

The C2 channel serves as the communication link between the compromised device (bot) and the C2 server. It is essential for issuing commands, receiving instructions, and exfiltrating data. To evade detection, C2 traffic is often obfuscated by encrypting or encoding the data being transmitted.

Data Exfiltration

C2 servers facilitate data exfiltration by instructing the compromised device to send specific data to the server. This data can include stolen credentials, sensitive documents, or other valuable information. Exfiltration techniques can vary, including uploading data to remote servers, sending data via email, or using covert channels to disguise the traffic.

Command Execution

C2 servers send commands to compromised devices to execute malicious actions. These commands can include launching further attacks, installing additional malware, or performing reconnaissance on the target environment. The executed commands can be tailored to the specific objectives of the threat actor.

Evasion Techniques

Threat actors use various evasion techniques to avoid detection by security tools. This may include domain hopping, encryption, or tunneling C2 traffic through legitimate services. Domain generation algorithms are often employed to dynamically generate domain names, making it difficult to predict or block the C2 infrastructure.

Persistence Mechanisms

C2 servers facilitate the establishment of persistence mechanisms on compromised devices, ensuring that the malware remains active and hidden. These mechanisms can include registry entries, scheduled tasks, or service installations.

Remote Access and Control

C2 servers allow threat actors to gain remote access and control over compromised devices. This control can involve taking screenshots, recording keystrokes, or even initiating video and audio surveillance.

Evolving Threat Landscape

Threat actors continuously adapt their C2 techniques to circumvent security measures. As a result, cybersecurity professionals and organizations must stay vigilant, employing advanced detection and prevention mechanisms to identify and mitigate C2 threats.

Enhance Your Threat Intelligence

See how the SentinelOne threat-hunting service WatchTower can surface greater insights and help you outpace attacks.

Learn More

Exploring the Use Cases of Command & Control (C2)

Threat actors utilize C2 infrastructure to orchestrate and execute malicious activities, ranging from data breaches to malware distribution. Here are some real-world use cases of C2, their significance, and how businesses are striving to secure against these risks.

  • Advanced Persistent Threats (APTs) – APT groups often establish C2 servers to maintain control over compromised networks for extended periods. They use these servers to exfiltrate sensitive data, propagate malware, and execute targeted attacks.
  • Ransomware Attacks – In ransomware campaigns, C2 servers serve as a crucial component for communication and ransom negotiation. Threat actors encrypt victims’ data and demand a ransom in exchange for decryption keys.
  • Distributed-Denial-of-Service (DDoS) Attacks – C2 servers are employed to coordinate botnets for launching DDoS attacks. These attacks flood a target’s servers or networks with traffic, rendering them inaccessible.
  • Banking Trojans – Banking Trojans like Zeus and TrickBot use C2 servers to steal sensitive financial information, including login credentials and banking details. The data is later used for fraudulent transactions.
  • Data Exfiltration – Threat actors employ C2 servers to surreptitiously transfer stolen data from compromised systems to their own infrastructure. This can include intellectual property, customer data, or proprietary information.

To combat the threat of C2 servers, cybersecurity experts have developed advanced techniques and tools for identifying and mitigating these malicious conduits. Network traffic analysis, anomaly detection, and threat intelligence sharing play critical roles in the fight against C2 infrastructure. Additionally, security measures like intrusion detection and prevention systems, firewalls, and endpoint protection aim to disrupt and block connections to C2 servers.

Businesses are actively implementing a range of security measures to protect against the risks associated with C2 activity:

  • Network Traffic Analysis – Organizations use network monitoring and traffic analysis tools to detect suspicious network traffic patterns and anomalies. This can help identify potential C2 communication.
  • Intrusion Detection and Prevention Systems (IDPS) – IDPS solutions are designed to detect and block C2 traffic in real-time. They use predefined rules and heuristics to identify malicious behavior.
  • Threat Intelligence Sharing – Businesses participate in threat information sharing communities and subscribe to threat intelligence feeds to stay informed about known C2 infrastructure and attack vectors.
  • Endpoint Detection and Response (EDR) – EDR solutions provide visibility into endpoint activities and can identify malicious processes that may be related to C2 activity.
  • User Training and Awareness – Employee education and awareness training are crucial for recognizing phishing attempts, which are often used to establish the initial foothold for C2-based attacks.
  • Regular Software Updates & Patch Management – Keeping software and systems up to date helps protect against known vulnerabilities that threat actors may exploit to establish C2 connections.
  • Encryption & Data Loss Prevention – Employing encryption and DLP technologies safeguards data from unauthorized exfiltration and mitigates the risks associated with data breaches.

Conclusion

C2 servers remain at the forefront of the cybersecurity battle, continuously evolving to exploit new vulnerabilities and adapt to emerging defense mechanisms. Understanding their role and the techniques employed by threat actors to maintain control is essential in developing effective strategies for cybersecurity professionals and organizations seeking to safeguard their digital assets and data in an increasingly hostile online environment.

Protect your systems from C2 server-based attacks with Singularity XDR, offering real-time prevention and response.

C2 Server FAQs

A command and control (C2) server is a centralized system that cybercriminals use to manage and control compromised devices within a network. The server acts as the operational hub for malware, sending commands to infected machines and receiving stolen data back from them. C2 servers enable attackers to execute various malicious activities like downloading additional malware payloads, exfiltrating sensitive data, and issuing commands to botnets.

A common example of a C2 server is the Log4j vulnerability that was used by attackers to remotely execute code on vulnerable systems. APT groups also use C2 servers to compromise networks and other examples of C2 servers include banking trojans and malware like TrickBot and Zeus. Botnets are managed and controlled by C2 servers as well.

A C2 server is used to remote manage and control infected devices. They send instructions and commands to bots and instruct them on what malicious activities to perform. C2 servers can be used to retrieve stolen data from compromised systems. They can also launch and co-ordinate large-scale DDoS attacks, distribute malware, and maintain control across infected devices.

Attackers also use C2 servers to mask their malicious activities and send commands through legit channels so that they appear to be genuine and not revealed as threats.

C2 control stands for Command and Control. It’s a channel that attackers use to send instructions to malware after it infects your system. The C2 server will manage infected devices, collect stolen data, and push out new commands or payloads. If you see outbound connections to suspicious external servers, that’s often a sign of C2 activity in progress.

C2 techniques include direct connections, like using hardcoded IP addresses or domains, and indirect methods, like abusing social media, cloud apps, or DNS tunneling. Some attackers hide C2 inside encrypted traffic, while others use standard web protocols to blend in. They’ll switch up their tactics often to avoid being blocked or detected by network security tools.

Security tools detect C2 by watching for unusual outbound network traffic, blocked domain requests, and strange command patterns. They will also flag known malicious IPs, spot anomalies in DNS queries, or pick up on encrypted connections heading to blacklisted destinations. Tools like SentinelOne Singularity XDR, firewalls, and network monitoring systems help you spot these signals early.

If you block the C2 server, the malware will lose its ability to get new instructions or exfiltrate stolen data. In most cases, the infection goes dormant or fails to operate as planned. You should still clean up infected devices, as attackers might try to reactivate them later or find alternate communication channels. Blocking C2 breaks the attacker’s control loop.

Discover More About Threat Intelligence

What is an Advanced Persistent Threat (APT)?Threat Intelligence

What is an Advanced Persistent Threat (APT)?

Advanced Persistent Threats (APTs) pose long-term risks. Understand the tactics used by APTs and how to defend against them effectively.

Read More
What is Spear Phishing? Types & ExamplesThreat Intelligence

What is Spear Phishing? Types & Examples

Spear phishing is a targeted form of phishing. Learn how to recognize and defend against these personalized attacks on your organization.

Read More
What is Cyber Threat Intelligence?Threat Intelligence

What is Cyber Threat Intelligence?

Cyber threat intelligence (CTI) helps organizations predict, understand, and defend against cyber threats, enabling proactive protection and reducing the impact of attacks. Learn how CTI enhances cybersecurity.

Read More
What is a Botnet in Cybersecurity?Threat Intelligence

What is a Botnet in Cybersecurity?

Botnets are networks of compromised devices used for malicious purposes. Learn how they operate and explore strategies to defend against them.

Read More
Ready to Revolutionize Your Security Operations?

Ready to Revolutionize Your Security Operations?

Discover how SentinelOne AI SIEM can transform your SOC into an autonomous powerhouse. Contact us today for a personalized demo and see the future of security in action.

Request a Demo
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2025 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use