noun Digital Technology.
Examples from the Web for malware
These attacks had distinct similarities with the malware used against Sony.U.S. Spies Say They Tracked ‘Sony Hackers’ For Years|Shane Harris|January 2, 2015|DAILY BEAST
Perhaps the most interesting and indeed relevant of this is the C2 (or Command and Control) addresses found in the malware.
Increasingly, criminals actually lease their malware from a group that guarantees their malware against detection.
These addresses were used by whoever carried out the attack to control the malware and can be found in the malware code itself.
Furthermore, checking online IP reputation services reveals that they have been used by malware operators in the past.