Get fresh insights, pro tips, and thought starters–only the best of posts for you.
A command and control server, also called a C2 server or C&C server, is attacker-controlled infrastructure used to communicate with compromised devices. A C2 server helps attackers remotely manage compromised machines after malware or another vulnerability gives them the access they require. It then acts as the control hub that sends instructions to infected systems and may receive stolen data, status updates, or execution results from them.
A C2 server usually becomes active after an attacker compromises a device through phishing, malware, stolen credentials, or software vulnerabilities. Once infected, the device creates an outbound connection to the attacker’s server.
Through this connection, the attacker may:
When attackers control many infected devices together, they may use the C2 server to manage a botnet. This allows them to coordinate large-scale attacks such as spam campaigns, credential theft, distributed denial-of-service attacks, or malware distribution.
Attackers often try to hide or protect their C2 infrastructure. Common techniques include:
A C2 server can turn a single compromised device into an active security incident. As long as the connection remains open, attackers may continue sending commands, stealing data, installing payloads, or expanding access.
Detecting and cutting off C2 communication early can help security teams stop an attack before it becomes a larger breach, ransomware event, or data theft incident.
Organizations can reduce risk by:
C2 server activity usually starts with a compromised endpoint trying to communicate with attacker-controlled infrastructure. Hexnode helps security teams focus on that endpoint layer, where early signs of compromise often appear.
With Hexnode XDR, teams can detect suspicious behavior, investigate endpoint activity, review threat context, and respond to incidents from a unified console. This can help security teams spot malware behavior, unusual processes, or unauthorized communication before the attack spreads further.
Alongside this, Hexnode UEM helps keep devices managed, compliant, and policy-aligned. By combining endpoint management with threat detection, organizations can reduce exposure and improve visibility across devices that connect to business resources.
No. Malware infects the device, while the C2 server gives attackers a way to control that infected device remotely.
Attackers use C2 servers to send commands, manage infected devices, download payloads, move laterally, or receive stolen data.