Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Botnet Uses Polygon Blockchain for Resilient Command Control

Botnet Uses Polygon Blockchain for Resilient Command Control

Posted on February 26, 2026 By CWS

Cybersecurity experts have unveiled a sophisticated botnet loader, known as Aeternum C2, which employs blockchain technology to fortify its command-and-control (C2) infrastructure against traditional takedown strategies. According to a report from Qrator Labs shared with The Hacker News, Aeternum diverges from conventional methods by embedding its commands within the public Polygon blockchain.

Innovative Use of Blockchain

The Aeternum botnet distinguishes itself by storing C2 instructions on the Polygon blockchain, a platform widely utilized by decentralized applications, including Polymarket, a major prediction market. This method renders its C2 infrastructure virtually indestructible by conventional takedown efforts.

This is not the first instance of a botnet integrating blockchain. Back in 2021, Google intervened against the Glupteba botnet, which used the Bitcoin blockchain as a backup mechanism to maintain its C2 server addresses.

Technical Details and Functionality

First discovered in December 2025, Aeternum C2’s details emerged when Outpost24’s KrakenLabs identified a threat actor named LenAI marketing the malware on underground forums. The malware, available in C++ for both x32 and x64 systems, operates by embedding commands in smart contracts on the Polygon blockchain. These instructions are then retrieved by bots querying public RPC endpoints.

The system is managed through a web-based panel, allowing users to select smart contracts, define command types, and update payload URLs. Commands are recorded as blockchain transactions, accessible to all compromised devices monitoring the network.

Resilience and Market Impact

The permanence of blockchain transactions means that once a command is issued, it cannot be modified or deleted by anyone other than the wallet owner. This allows operators to manage multiple smart contracts simultaneously, each potentially serving different functions such as clippers, stealers, RATs, or miners.

In addition to its blockchain-based resilience, Aeternum includes anti-analysis features to prolong infections. Techniques include detecting virtualized environments and offering customers the ability to scan their builds via Kleenscan, ensuring they bypass antivirus detection.

Operational costs for this botnet are minimal, with a mere $1 worth of MATIC, Polygon’s native cryptocurrency, covering up to 150 transactions. This eliminates the need for server rentals or domain registrations, requiring only a crypto wallet and a local panel copy.

Broader Implications and Related Threats

The creator, LenAI, has attempted to sell the entire toolkit for $10,000, citing time constraints and involvement in other projects as reasons. A second crimeware solution by LenAI, ErrTraffic, automates ClickFix attacks, exploiting website glitches to deceive users.

Meanwhile, Infrawatch has disclosed another underground service deploying dedicated hardware into U.S. homes, integrating them into a proxy network named DSLRoot. This service, under the alias GlobalSolutions, offers residential ADSL proxies for sale, with operations spanning over 20 U.S. states.

This extensive network employs custom software to remotely manage consumer modems and Android devices, facilitating anonymous traffic routing through U.S. IP addresses. The operator, identified as Belarusian national Andrei Holas, promotes this service on BlackHatWorld.

The Hacker News Tags:anti-analysis, Blockchain, Botnet, C2 infrastructure, crypto wallet, Cryptocurrency, cyber attack, cyber threat, Cybercrime, Cybersecurity, hacker news, Malware, network security, Polygon, smart contracts

Post navigation

Previous Post: Fake Zoom Website Exploits 1,437 Users with Spyware
Next Post: Cloaking Platform 1Campaign Bypasses Google Ads Security

Related Posts

Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager The Hacker News
Cybercriminals Use Fake Apps to Steal Data and Blackmail Users Across Asia’s Mobile Networks Cybercriminals Use Fake Apps to Steal Data and Blackmail Users Across Asia’s Mobile Networks The Hacker News
From Browser Stealer to Intelligence-Gathering Tool From Browser Stealer to Intelligence-Gathering Tool The Hacker News
React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors The Hacker News
Anthropic Introduces Claude Code Security for AI Vulnerability Scanning Anthropic Introduces Claude Code Security for AI Vulnerability Scanning The Hacker News
CISA Alerts on FileZen Vulnerability Exploitation CISA Alerts on FileZen Vulnerability Exploitation The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Agent Tesla Phishing Campaign Evades Detection with Advanced Tactics
  • Cloaking Platform 1Campaign Bypasses Google Ads Security
  • Botnet Uses Polygon Blockchain for Resilient Command Control
  • Fake Zoom Website Exploits 1,437 Users with Spyware
  • Top Risks Boards Must Prioritize in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Agent Tesla Phishing Campaign Evades Detection with Advanced Tactics
  • Cloaking Platform 1Campaign Bypasses Google Ads Security
  • Botnet Uses Polygon Blockchain for Resilient Command Control
  • Fake Zoom Website Exploits 1,437 Users with Spyware
  • Top Risks Boards Must Prioritize in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News