Attack c2 communication
include apt_packet
After breaching an IT ecosystem, cybercriminals then deploy trojan malware that establishes a series of backdoor connections to criminal servers (command and control servers) to facilitate the exfiltration of sensitive data.
Once these backdoors are established, a persistent presence is achieved.
Learn more about data exfiltration.
action start_c2_communication() = { }
action stop_c2_communication() = { }