Blog Posts Business Management

Detecting Command & Control Communications—Context Is Key

By now, the concept of the cyber attack chain—or kill chain—is widely accepted as a way to understand and deal with threats.iStock-506503488_Command-Control Center_resized.png

The first thing that malware does once it’s established on the network is call home—reach out to a Command and Control (C&C) server. C&Cs are famous for controlling botnets, but they are essential for any multi-stage attack. For example, ransomware calls a control server to obtain a unique encryption key.

As we discussed in a previous blog, to detect complex attacks, you need to monitor and analyze information across attack vectors (such as web, email and files), the attack chain, and the IT infrastructure. We’ll talk more about this later but for now, let’s focus on how to effectively detect C&C communications.

Read more.

The post Detecting Command & Control Communications—Context Is Key appeared first on Customer Experience Management Blog.

Leave a Comment

Get the BPI Web Feed

Using the HTML code below, you can display this Business Process Incubator page content with the current filter and sorting inside your web site for FREE.

Copy/Paste this code in your website html code:

<iframe src="https://www.businessprocessincubator.com/content/detecting-command-control-communicationscontext-is-key/?feed=html" frameborder="0" scrolling="auto" width="100%" height="700">

Customizing your BPI Web Feed

You can click on the Get the BPI Web Feed link on any of our page to create the best possible feed for your site. Here are a few tips to customize your BPI Web Feed.

Customizing the Content Filter
On any page, you can add filter criteria using the MORE FILTERS interface:

Customizing the Content Filter

Customizing the Content Sorting
Clicking on the sorting options will also change the way your BPI Web Feed will be ordered on your site:

Get the BPI Web Feed

Some integration examples

BPMN.org

XPDL.org

×