Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown
    Cybersecurity

    Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

    adminBy adminFebruary 26, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts.

    “Instead of relying on traditional servers or domains for command-and-control, Aeternum stores its instructions on the public Polygon blockchain,” Qrator Labs said in a report shared with The Hacker News.

    “This network is widely used by decentralized applications, including Polymarket, the world’s largest prediction market. This approach makes Aeternum’s C2 infrastructure effectively permanent and resistant to traditional takedown methods.”

    This is not the first time botnets have been found relying on blockchain for C2. In 2021, Google said it took steps to disrupt a botnet known as Glupteba that uses the Bitcoin blockchain as a backup C2 mechanism to fetch the actual C2 server address.

    Details of Aeternum C2 first emerged in December 2025, when Outpost24’s KrakenLabs revealed that a threat actor by the name of LenAI was advertising the malware on underground forums for $200 that grants customers access to a panel and a configured build. For $4,000, customers were allegedly promised the entire C++ codebase along with updates.

    A native C++ loader available in both x32 and x64 builds, the malware works by writing commands to be issued to the infected host to smart contracts on the Polygon blockchain. The bots then read those commands by querying public remote procedure call (RPC) endpoints.

    All of this is managed via the web-based panel, from where customers can select a smart contract, choose a command type, specify a payload URL and update it. The command, which can target all endpoints or a specific one, is written into the blockchain as a transaction, after which it becomes available to every compromised device that’s polling the network.

    “Once a command is confirmed, it cannot be altered or removed by anyone other than the wallet holder,” Qrator Labs said. “The operator can manage multiple smart contracts simultaneously, each one potentially serving a different payload or function, such as a clipper, a stealer, a RAT, or a miner.”

    According to a two-part research published by Ctrl Alt Intel earlier this month, the C2 panel is implemented as a Next.js web application that allows operators to deploy smart contracts to the Polygon blockchain. The smart contracts contain a function that, when called by the malware via the Polygon RPC, causes it to return the encrypted command that’s subsequently decoded and run on the victim machines.

    Besides using the blockchain to turn it into a takedown-resistant botnet, the malware packs in various anti-analysis features to extend the lifespan of infections. This includes checks to detect virtualized environments, in addition to equipping customers with the ability to scan their builds via Kleenscan to ensure that they are not flagged by antivirus vendors.

    “The operational costs are negligible: $1 worth of MATIC, the native token of the Polygon network, is enough for 100 to 150 command transactions,” the Czechian cybersecurity vendor said. “The operator doesn’t need to rent servers, register domains, or maintain any infrastructure beyond a crypto wallet and a local copy of the panel.”

    The threat actor has since attempted to sell the entire toolkit for an asking price of $10,000, claiming a lack of time for support and their involvement in another project. “I will sell the entire project to one person with permission for resale and commercial use, with all ‘rights,'” LenAI said. “I will also give useful tips/notes on development that I did not have time to implement.”

    It’s worth noting that LenAI is also behind a second crimeware solution called ErrTraffic that enables threat actors to automate ClickFix attacks by generating fake glitches on compromised websites to induce a false sense of urgency and deceive users into following malicious instructions.

    The disclosure comes as Infrawatch published details of an underground service that deploys dedicated laptop hardware into American homes to co-opt the devices into a residential proxy network named DSLRoot that redirects malicious traffic through them.

    The hardware is designed to run a Delphi-based program called DSLPylon that’s equipped with capabilities to enumerate supported modems on the network, as well as remotely control the residential networking equipment and Android devices via an Android Debug Bridge (ADB) integration.

    “Attribution analysis identifies the operator as a Belarusian national with residential presence in Minsk and Moscow,” Infrawatch said. “DSLRoot is estimated to operate roughly 300 active hardware devices across 20+ U.S. states.”

    The operator has been identified as Andrei Holas (aka Andre Holas and Andrei Golas), with the service promoted on BlackHatWorld by a user operating under the alias GlobalSolutions, claiming to offer physical residential ADSL proxies for sale for $190 per month for unrestricted access. It is also available for $990 for six months and $1,750 for annual subscriptions.

    “DSLRoot’s custom software provides automated remote management of consumer modems (ARRIS/Motorola, Belkin, D-Link, ASUS) and Android devices via ADB, enabling IP address rotation and connectivity control,” the company noted. “The network operates without authentication, allowing clients to route traffic anonymously through U.S. residential IPs.”

    Aeternum Blockchain Botnet commands encrypted Evade Polygon Stores Takedown
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhy do data centers need so much water?
    Next Article Why DLSS 4.5 is just a crutch for unoptimized AAA games
    admin
    • Website

    Related Posts

    Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk

    March 5, 2026

    Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers

    March 5, 2026

    Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    These are the 7 best phones I found at MWC 2026

    March 5, 2026

    Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk

    March 5, 2026

    Why Most Enterprise SEO Operating Models Are Structurally Broken

    March 5, 2026

    Zank Remote – Android, Fire TV 20.3.0 APK Download by zank

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (611)
    • Privacy & Online Earning (91)
    • SEO & Digital Marketing (386)
    • Tech Tools & Mobile / Apps (749)
    • WiFi / Internet & Networking (108)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    These are the 7 best phones I found at MWC 2026

    March 5, 2026

    Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk

    March 5, 2026

    Why Most Enterprise SEO Operating Models Are Structurally Broken

    March 5, 2026
    Most Popular
    • These are the 7 best phones I found at MWC 2026
    • Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk
    • Why Most Enterprise SEO Operating Models Are Structurally Broken
    • Zank Remote – Android, Fire TV 20.3.0 APK Download by zank
    • Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers
    • Give your Meta Quest a hand tracking upgrade with this hidden setting
    • Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks
    • Are your PPC ads still authentic in the age of AI creative?
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.