Once attackers get inside a network, they need a way to communicate with the systems they’ve compromised.
They need to send instructions, move data, and stay connected — often without being detected.
This communication channel is called Command and Control, or C2.
C2 is the link between the attacker and the compromised system — the digital “walkie‑talkie” they use to control the attack.
Think of C2 like a burglar sneaking into a building and planting a hidden remote‑control device inside:
- From outside, they can unlock doors
- Turn off alarms
- Move cameras
- And quietly control what happens inside
Digitally, attackers do the same thing.
C2 lets them:
- run commands
- move laterally
- steal data
- deploy ransomware
- stay connected without being noticed
Why this matters for insurance:
C2 is often where defenders can detect an attack — if they have the right visibility.
Many companies don’t monitor outbound traffic closely, which allows attackers to quietly communicate with external servers for days or weeks.
When a company says they “didn’t see any signs of data exfiltration,” the real question is:
“Did they have visibility into C2 traffic — and would they have noticed if data was leaving the network?”
The takeaway:
C2 is how attackers stay connected and in control.
Detecting it early can stop an incident before it becomes a major claim.
Pop Culture Parallel:
If you’ve seen Blackhat, the scenes where attackers remotely issue commands to compromised systems are a clear example of how C2 keeps an intrusion alive and coordinated.
Real‑World Example:
During the 2020 SolarWinds breach, attackers used stealthy C2 channels to communicate with infected systems for months — a reminder that without outbound traffic monitoring, even sophisticated organizations can miss ongoing compromise.
Previous Episode:
22. Defense Evasion ←
Next Episode:
24. MFA Fatigue →
Related Episodes:
22. Defense Evasion
21. Impact
16. Lateral Movement
17. Credential Access
12. Initial Access
Browse the Series:
View all Cyber in Plain English episodes →
Cyber Orientation Hub:
Explore the full Cyber Orientation hub →
Learn more at https://insurancedesignationlookup.com/cyber-orientation/
#CyberForInsurance #CyberInPlainEnglish #LettersForSuccess