Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

UK’s Data Watchdog Gets a Makeover to Match Growing Demands

February 27, 2026

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

February 27, 2026

Exploitable Vulnerabilities Present in 87% of Organizations

February 27, 2026
Facebook X (Twitter) Instagram
Friday, February 27
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Aeternum Botnet Shifts Command Control to Polygon Blockchain
News

Aeternum Botnet Shifts Command Control to Polygon Blockchain

Team-CWDBy Team-CWDFebruary 26, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A newly identified botnet loader is shifting command-and-control (C2) operations onto the Polygon blockchain, eliminating the central servers that authorities and security firms have historically targeted to dismantle malicious networks.

Aeternum C2, uncovered by Qrator Research Lab while monitoring cybercrime forums, replaces conventional infrastructure with smart contracts hosted on the Polygon blockchain. Instead of communicating with hardcoded IP addresses or registered domains, infected machines retrieve instructions written directly to the blockchain, where transactions are publicly recorded and cannot be removed.

For years, law enforcement agencies have disrupted operations such as Emotet, TrickBot and QakBot by seizing servers or suspending domains. Aeternum appears to remove that weak point entirely.

Using Smart Contracts For Control

According to the seller’s documentation and panel screenshots reviewed by Qrator, Aeternum is a native C++ loader offered in x32 and x64 builds.

Operators manage infections via a web dashboard that lets them select a smart contract, choose a command type, and specify a payload URL. Once submitted, the instruction is written to the blockchain as a transaction and becomes accessible to bots querying more than 50 remote procedure call endpoints.

The seller claims new commands reach active bots within two to three minutes.

Operators can run multiple smart contracts simultaneously, each linked to different payloads or functions, including:

  • Clipper modules

  • Information-stealing DLLs

  • PowerShell or batch scripts

  • Remote access tools and cryptocurrency miners

Read more on blockchain-based C2: North Korean Hackers Use EtherHiding to Steal Crypto

Blockchain data is replicated across thousands of nodes, meaning there is no central infrastructure to seize. Only the wallet holder can issue or modify commands tied to a given contract.

How the Model Complicates Disruption Efforts

Traditional takedown strategies rely on identifiable infrastructure. Domains can be suspended. Hosting providers can null-route IP addresses. Physical servers can be confiscated. Even peer-to-peer (P2P) botnets have been weakened by targeting bootstrap nodes.

Blockchain-based control changes that equation. Commands stored on-chain are effectively permanent and globally accessible.

The contrast can be seen in the 2021 disruption of the Glupteba botnet, which Google said reduced infections by 78%. Glupteba used the Bitcoin blockchain as a backup channel, allowing it to recover months later. Aeternum, by comparison, appears to rely on blockchain as its primary communication layer.

Operational costs are also low. The seller advertises lifetime licences or full C++ source code, noting that $1 in MATIC can fund 100-150 command transactions. No domains, rented servers or hosting providers are required.

“Traditional upstream takedowns become harder when the C2 channel is immutable, and even if every infected machine is remediated, the operator can redeploy using the same contracts without rebuilding anything,” Qrator wrote.

“This makes proactive DDoS mitigation more important than ever. If the botnet can’t be taken down at the source, the only remaining defence is filtering its traffic at the edge.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOperating in a World of Permanent Instability
Next Article Exploitable Vulnerabilities Present in 87% of Organizations
Team-CWD
  • Website

Related Posts

News

UK’s Data Watchdog Gets a Makeover to Match Growing Demands

February 27, 2026
News

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

February 27, 2026
News

Operating in a World of Permanent Instability

February 26, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Can password managers get hacked? Here’s what to know

November 14, 2025

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Children and chatbots: What parents should know

January 23, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.