LEVIATHAN: COMMAND AND CONTROL COMMUNICATIONS ON PLANET EARTH
Every day, computer network attackers leverage a Leviathan of compromised computer infrastructure, based in every corner of the globe, to play hide-and-seek with network security, law enforcement, and counterintelligence personnel.
This presentation draws a new map of Planet Earth, based not on traditional parameters, but on hacker command and control (C2) communications. The primary data points used in this worldwide cyber survey are more than 30 million malware callbacks to over 200 countries and territories over an 18-month period, from January 2013 to June 2014.
This report analyzes first stage command and control (C2) malware callbacks from clients around the world.