Imagine if a malware C2 is located in an offshore host and you need to take control of the C2. They are obviously not going to just hand it over, so what if they were attacked with a massive denial of service attack until they hand it over? Such an attack would cost a small hosting company far too much for them to say “no”. What are the pros and cons of this method? Has there been any documented cases of this happening?