C2
Pen testing
Hak5 Cloud C²
Hak5 Cloud C²
Hak5 Cloud C² is a legitimate remote access and command-and-control (C2) framework designed for red-teaming exercises but frequently abused by attackers for persistence.
Known Variants
Known Variants
While no specific variants exist, its modular nature allows significant customization for malicious campaigns.
While no specific variants exist, its modular nature allows significant customization for malicious campaigns.
Mitigation Strategies
Mitigation Strategies
Restrict access to cloud-based C2 systems, monitor for unauthorized outbound communications, and educate staff about the risks of remote management tools.
Targeted Industries or Sectors
Targeted Industries or Sectors
Used in enterprise environments, both for legitimate testing and unauthorized activities.
Used in enterprise environments, both for legitimate testing and unauthorized activities.
Associated Threat Actors
Associated Threat Actors
Leveraged by cybercriminals for stealthy command-and-control operations.
Leveraged by cybercriminals for stealthy command-and-control operations.
References
Threat Hunting Platform - Hunt.io
Products
Hunt Intelligence, Inc.
Threat Hunting Platform - Hunt.io
Products
Hunt Intelligence, Inc.
Threat Hunting Platform - Hunt.io
Products
Hunt Intelligence, Inc.