Attackers using multiple command and control (C&C) systems to communicate with backdoors and other malware can be a complicated issue and is one of the tougher scenarios a security professional can run up against.
We are accustomed to clicking on something, triggering a response, and activating the precautionary measures we have in place. However, these attacks can be particularly nefarious, especially when coupled with zero-day threats. In this scenario, we don’t have sight of what attackers are after, what they do or whether the payload will deliver.