C2 Takeover: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
(No difference)
|
Latest revision as of 11:14, 3 November 2020
1. C2 takeover refers to cyber criminals taking over unpatched or unmonitored technological infrastructures with Command and Control (C2) capabilities for malicious activities.
Related Term: Conduit Devices
![]()
|

2. Command and Control (C2) takeover denotes compromised systems leveraged by threat actors for nefarious purposes. Prior to takeover, these legitimate systems were likely unpatched or unmonitored, and thus an attractive target for threat actors to leverage as their C2 infrastructure.
Source: (Verizon, 2017)