All Posts
Malware
Research
1
min read

The Rise of Malware Using Legitimate Services for Communications

One of the new evolutions in malware capabilities is the use of legitimate services like Google Docs or Facebook as a conduit for command and control communications. Learn more...
Published on
January 11, 2018
Table of Contents
<p>Malware often includes the ability to communicate with attacker controlled systems on the Internet from within compromised networks. This gives the attacker several important capabilities.</p><p>Some examples of this communication include:</p><ul><li>Receive “heartbeats” to maintain an inventory of compromised systems</li><li>Send Remote control commands and receive the results of those commands</li><li>Exfiltrate data from inside compromised networks</li><li>Send updates or new capabilities to already compromised hosts</li></ul><p>This communication between malware and attacker controlled servers on the Internet is often referred to as “command and control.” This is also a primary area of focus for detection of malware infections in security software outside of detecting the malware itself.</p><p>As defenders have gotten better at detecting Internet hosts and domains used for malware command and control, attackers have had to develop their own countermeasures to try and stay ahead of detection and blocking efforts. Techniques such as <a href="https://www.anomali.com/blog/hacker-tactics-part-1-domain-generation-algorithms">Domain Generating Algorithms</a> have been employed to try and evade traditional detection mechanisms put in place by defenders.</p><p>One of the new evolutions in malware capabilities is the use of legitimate services as a conduit for command and control communications. Imagine malware that uses Github, or Google Docs, or Facebook to communicate with attackers.  Defenders are stuck trying to discern between legitimate traffic and malicious traffic that is all encrypted and going to the same popular and very legitimate services on the Internet. The dominant way to refer to this technique is “Legit Services C2.”</p><p><img alt="" src="https://cdn.filestackcontent.com/sCl8ieefQzCQzH9jEXsj"/></p><p style="text-align: center;"><em>A variety of legitimate services seen abused for C2</em></p><p>There are many possible services available across the Internet that could be used for malware command and control. As new services are constantly popping up, there is essentially an unlimited supply of options for using legit services for malware command and control.</p><p>We did some detailed research into malware that uses legit services for C2. We identify a number of malware families that have been observed taking advantage of legit services. We also dig into how malware uses legit services for C2.  Finally, we offer some suggestions for potentially sifting out malware usage vs. legitimate usage of these services.  We packed all this research into a white paper titled, Rise of Legit Services for Backdoor Command and Control which can be <a href="https://anomali.cdn.rackfoundry.net/files/anomali-labs-reports/legit-services.pdf">downloaded here</a> without registration. Please feel free to use this research and we hope that others will expand on it.</p>

FEATURED RESOURCES

January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
December 23, 2025
Anomali Cyber Watch

Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more

SantaStealer Infostealer Threat Gains Traction in Underground Forums. From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025. React2Shell Exploitation Expands With New Payloads and Broader Targeting. Russian Phishing Campaign Delivers Phantom Stealer via ISO Attachments. And More...
Read More
December 16, 2025
Anomali Cyber Watch

Anomali Cyber Watch: GhostPenguin, SharePoint Exploits, Android Spyware, CastleLoader Malware Expansion, and more

Read More
Explore All