Join us this Friday at 12:00 PM EST LIVE! — Attackers use Command and Control (C2) servers to maintain persistence on a victim’s computer inside a target network. When a connection is established, the infected system sends a signal to the attacker’s server in search of its next command. The infected machine will execute orders from the attacker’s command and control server and may deploy more malware and resources to enhance its foothold on the network. Attackers now have full control of the victim’s computer and can run whatever code they want. Typically, the malicious malware will spread to other computers and servers, thereby gaining complete control of that network. This is a major tactic used in ransomware.