Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Botnet Uses Polygon Blockchain for Resilient Command Control

Botnet Uses Polygon Blockchain for Resilient Command Control

Posted on February 26, 2026 By CWS

Cybersecurity experts have unveiled a sophisticated botnet loader, known as Aeternum C2, which employs blockchain technology to fortify its command-and-control (C2) infrastructure against traditional takedown strategies. According to a report from Qrator Labs shared with The Hacker News, Aeternum diverges from conventional methods by embedding its commands within the public Polygon blockchain.

Innovative Use of Blockchain

The Aeternum botnet distinguishes itself by storing C2 instructions on the Polygon blockchain, a platform widely utilized by decentralized applications, including Polymarket, a major prediction market. This method renders its C2 infrastructure virtually indestructible by conventional takedown efforts.

This is not the first instance of a botnet integrating blockchain. Back in 2021, Google intervened against the Glupteba botnet, which used the Bitcoin blockchain as a backup mechanism to maintain its C2 server addresses.

Technical Details and Functionality

First discovered in December 2025, Aeternum C2’s details emerged when Outpost24’s KrakenLabs identified a threat actor named LenAI marketing the malware on underground forums. The malware, available in C++ for both x32 and x64 systems, operates by embedding commands in smart contracts on the Polygon blockchain. These instructions are then retrieved by bots querying public RPC endpoints.

The system is managed through a web-based panel, allowing users to select smart contracts, define command types, and update payload URLs. Commands are recorded as blockchain transactions, accessible to all compromised devices monitoring the network.

Resilience and Market Impact

The permanence of blockchain transactions means that once a command is issued, it cannot be modified or deleted by anyone other than the wallet owner. This allows operators to manage multiple smart contracts simultaneously, each potentially serving different functions such as clippers, stealers, RATs, or miners.

In addition to its blockchain-based resilience, Aeternum includes anti-analysis features to prolong infections. Techniques include detecting virtualized environments and offering customers the ability to scan their builds via Kleenscan, ensuring they bypass antivirus detection.

Operational costs for this botnet are minimal, with a mere $1 worth of MATIC, Polygon’s native cryptocurrency, covering up to 150 transactions. This eliminates the need for server rentals or domain registrations, requiring only a crypto wallet and a local panel copy.

Broader Implications and Related Threats

The creator, LenAI, has attempted to sell the entire toolkit for $10,000, citing time constraints and involvement in other projects as reasons. A second crimeware solution by LenAI, ErrTraffic, automates ClickFix attacks, exploiting website glitches to deceive users.

Meanwhile, Infrawatch has disclosed another underground service deploying dedicated hardware into U.S. homes, integrating them into a proxy network named DSLRoot. This service, under the alias GlobalSolutions, offers residential ADSL proxies for sale, with operations spanning over 20 U.S. states.

This extensive network employs custom software to remotely manage consumer modems and Android devices, facilitating anonymous traffic routing through U.S. IP addresses. The operator, identified as Belarusian national Andrei Holas, promotes this service on BlackHatWorld.

The Hacker News Tags:anti-analysis, Blockchain, Botnet, C2 infrastructure, crypto wallet, Cryptocurrency, cyber attack, cyber threat, Cybercrime, Cybersecurity, hacker news, Malware, network security, Polygon, smart contracts

Post navigation

Previous Post: Fake Zoom Website Exploits 1,437 Users with Spyware
Next Post: Cloaking Platform 1Campaign Bypasses Google Ads Security

Related Posts

Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling The Hacker News
EngageLab SDK Vulnerability Risks Millions of Android Users EngageLab SDK Vulnerability Risks Millions of Android Users The Hacker News
RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories The Hacker News
SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version The Hacker News
Oracle Resolves Critical RCE Vulnerability in Identity Manager Oracle Resolves Critical RCE Vulnerability in Identity Manager The Hacker News
Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark