|1. C2 takeover refers to cyber criminals taking over unpatched or unmonitored technological infrastructures with Command and Control (C2) capabilities for malicious activities.
Related Term: Conduit Devices
2. Command and Control (C2) takeover denotes compromised systems leveraged by threat actors for nefarious purposes. Prior to takeover, these legitimate systems were likely unpatched or unmonitored, and thus an attractive target for threat actors to leverage as their C2 infrastructure.
Source: (Verizon, 2017)