Defenders may have a plan, but attackers have one, too: it’s called the cyber kill chain. The cyber kill chain is the order of operations by which a sophisticated cyber attack is launched, and it contains seven stages.

Command and control (C2) is the second to the last stage, and it’s where the “rubber hits the road,” you could say. During the C2 stage, a threat actor has already achieved compromise and is now looking to establish further control so they can act on their objectives. But all is not lost, C2 still presents an opportunity to detect, disrupt, and remediate before the impact ramps up exponentially. Unfortunately, many don’t know how to do this, or lack the tools to do it well. In the real world, “almost” doesn’t count, and you end up with a breach on your hands.

In this blog, we’ll go over just what a command-and-control attack is, where it fits in the cyber kill chain, and what can be done to stop it — even while it’s currently in progress.

What Is Command and Control in Cybersecurity?

Command and control is the sixth stage of the seven-stage cyber-attack chain in which attackers remotely establish control of the victim’s systems via malicious C2 commands.

Also referred to as C2 and C&C, the command-and-control stage is what cybercriminals have been working hard to achieve since step one: reconnaissance. At this point, the attacker has already made their way past other defenses (successfully, at that) and is getting ready to complete their objectives: exfiltrating data, encrypting information, launching a ransomware attack, and more.

Where C2 Falls in the Attack Chain

As the sixth phase in this attack chain, the purpose of command and control is to establish backdoors and provide attackers with the kind of hands-on access they need to progress towards their ultimate objectives. This step accomplishes that through establishing open communication channels between the victim’s servers and the cybercriminals themselves. Cybersecurity defenses identify command and control activity as part of a defense in depth strategy, so you can identify post compromise activity, disrupt the attack sequence, and eject the threat actor from your environment.

The Anatomy of the Command-and-Control Stage

While not as specific, the cyber kill chain does compliment the more technical MITRE ATT&CK framework in explaining tactical adversarial behavior. For example, according to MITRE ATT&CK, there are at least 18 different C2 techniques adversaries can implement. They include:

1. Application layer protocol

2. Communication via removable media

3. Content injection

4. Data encoding

5. Data obfuscation

6. Dynamic resolution

7. Encrypted channel

8. Fallback channels

9. Hide infrastructure

10. Ingress tool transfer

11. Multi-stage channels

12. Non-application layer protocol

13. Non-standard port

14. Protocol tunneling

15. Proxy

16. Remote access software

17. Traffic signaling

18. Web service

In addition, there are three different command and control attack architectures:

1. Centralized architecture: The classic client/server scenario in which all victimized computers communicate with a single malicious host machine.

2. Peer-to-peer architecture: Each infected computer sends messages to each other. This is typically a plan B in case the central server goes down, undermining the attack.

3. Random architecture: Infected computers are pinged by a host of random malicious machines, making this one very difficult to detect.

By leveraging these techniques, threat actors communicate with victim systems for the purpose of:

  • Compromising data traffic channels
  • Enable lateral movement
  • Elevate privileges
  • Exfiltrate data and gather information

Fortra Breaks the Cyber Kill Chain by Disrupting C2 Behaviors

Because a single IP sending out C2 commands can be easy to detect, attackers rely on load balancers, redirectors, proxies, encryption, obfuscation, and dynamic DNS services to disguise their malicious traffic. This essentially makes catching an attack at the command-and-control stage equivalent to winning a game of hide and seek. Not all tools are adapted to win this game, but these advanced solutions from Fortra are:

  • Fortra Extended Detection and Response (XDR) includes intrusion detection systems (IDS) for network traffic analysis (NTA) to identify malicious and suspicious connections and command and control beacons, with automated containment actions to block malicious traffic at the network perimeter
  • Fortra security consulting service offerings can perform penetration tests and other red team exercises on your behalf to validate controls and advise on tactical and strategic improvement.
Fortra's Alert Logic Staff
About the Author
Fortra's Alert Logic Staff

Related Post

Ready to protect your company with Alert Logic MDR?