Can we C2? Yes we can!

Summary

The article discusses the increasing trend of advanced attackers utilizing legitimate internet channels, such as social networks, for command and control (C2) and data exfiltration. It highlights how these methods bypass traditional security controls.

IFF Assessment

FOE

The article details advanced attacker techniques, representing a challenge and threat to defenders.

Defender Context

Defenders need to be aware of attackers leveraging common internet services for C2 communications and data exfiltration. This requires enhanced monitoring of outbound traffic and the ability to distinguish legitimate usage from malicious activity, potentially through deep packet inspection and behavioral analysis.

Read Full Story →