Connects to a C&C server to allow remote access to the attackers.Extract and access information from the infected computer in order to find other potential victims, steal internal business information or even act as a staging point for the infection of other systems. c. Intercept and modify connections to steal private and sensitive information.