Skip to content
Services Work ThreatFade About Blog Pricing Careers Start a project →
← All articles
Security Research · 5 min read

ThreatFade: How We Detected QUIC-Based C2 Evasion at Scale

May 21, 2026 · Tinlance Team

When we set out to build ThreatFade, we wanted to tackle one of the hardest problems in network security: detecting command-and-control traffic that's specifically designed to look like nothing.

QUIC-based C2 frameworks like Merlin are particularly tricky — they ride on the same protocol as your Google searches. Here's how we approached the problem and what our validation showed.

The Challenge

Modern C2 frameworks have evolved significantly. Where attackers once used obvious beaconing patterns, today's tools use encrypted QUIC channels, randomised timing, and legitimate-looking traffic volumes.

Our Approach

ThreatFade uses behavioural z-score analysis rather than signature matching. Against our test PCAP of 490,000 packets of real Merlin QUIC C2 traffic, we achieved a z-score of 14.76 — far above the threshold needed for confident detection.

This level of signal clarity means fewer false positives and faster incident response times.

What's Next

We're currently expanding our PCAP validation dataset and adding support for more C2 frameworks. If you're working in threat detection and want early access to ThreatFade, join our waitlist.

Share this article

LinkedIn X / Twitter

Building something in AI or cybersecurity?

Start a project with us →
Stay sharp

Get research like this in your inbox.

No fluff. AI and cybersecurity engineering — when it is worth reading.