MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Font ResizerAa
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Reading: Researchers Uncover Aeternum C2 Infrastructure with Advanced Persistence and Network Evasion Features
Share
Font ResizerAa
MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Search
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Have an existing account? Sign In
Follow US
© Market Alert News. All Rights Reserved.
  • bitcoinBitcoin(BTC)$78,098.000.52%
  • ethereumEthereum(ETH)$2,346.481.27%
  • tetherTether(USDT)$1.00-0.01%
  • rippleXRP(XRP)$1.43-0.29%
  • binancecoinBNB(BNB)$632.160.16%
  • usd-coinUSDC(USDC)$1.000.00%
  • solanaSolana(SOL)$86.45-0.15%
  • tronTRON(TRX)$0.3237780.17%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.02-0.62%
  • dogecoinDogecoin(DOGE)$0.0988300.36%
Smart Contracts

Researchers Uncover Aeternum C2 Infrastructure with Advanced Persistence and Network Evasion Features

Last updated: February 28, 2026 4:35 am
Published: 2 months ago
Share

For years, taking down a botnet meant finding its command-and-control (C2) server, seizing the domain, and watching the network go dark. Law enforcement used this method to dismantle major operations like Emotet, TrickBot, and QakBot.

A newly discovered botnet loader called Aeternum C2 has been built specifically to close that door, storing all of its instructions not on any server or domain, but directly on the Polygon blockchain.

Aeternum’s commands live inside smart contracts on the Polygon network, a public blockchain replicated across thousands of nodes worldwide.

Since there is no single server to seize or domain to suspend, the infrastructure remains available regardless of what any authority or platform chooses to do.

Defenders who have spent years dismantling botnets through infrastructure seizure now face a model where that strategy simply does not work, and Aeternum appears to be the first commercially available implementation to make blockchain-based C2 a ready-to-use product.

Qrator Labs analysts identified the loader while monitoring cybercrime networks, noting it is written in native C++ and available in both 32-bit and 64-bit builds.

Researchers found that every command issued to infected machines is recorded as a transaction on the Polygon blockchain, with bots reading those commands through public remote procedure call (RPC) endpoints.

According to the seller’s documentation, all active bots receive updates within two to three minutes — faster and more consistent than traditional peer-to-peer botnets.

The botnet is marketed on underground forums as either a lifetime license with a preconfigured build or as full C++ source code with ongoing updates.

Running costs are negligible: just $1 worth of MATIC, Polygon’s native token, covers 100 to 150 command transactions.

With no servers to rent or domains to register, the operational overhead for maintaining a resilient botnet is close to zero, placing it within reach of far more threat actors.

The potential damage from botnets built on this model stretches well beyond individual campaigns.

Once deployed, they can grow uninterrupted and be used for large-scale DDoS attacks, credential stuffing, click fraud, proxy-as-a-service abuse, and data theft.

Even a complete cleanup of infected machines leaves the operator’s smart contracts intact, meaning a full redeployment is possible at any moment without rebuilding infrastructure.

Blockchain-Based C2: How Aeternum Operates and Evades Detection

The operator manages everything through a web-based control panel. From this interface, the attacker selects a smart contract, picks a command type — whether targeting all bots, pinging a specific machine by hardware ID (HWID), or pushing a DLL loader — then provides a payload URL and publishes the update to the blockchain.

Once confirmed on-chain, a command cannot be altered or removed by anyone except the wallet owner. The operator can run multiple contracts at once, with each one tied to a different function such as a clipper, a stealer, a remote access tool (RAT), or a miner.

Aeternum also includes anti-VM detection, blocking execution inside virtualized environments typically used by antivirus vendors and malware analysts.

The seller bundles a scantime scanner powered by the Kleenscan API. This shows that only 12 of 37 engines flagged the sample, while CrowdStrike, Avast, Avira, and ClamAV all returned clean results at the time of testing.

Traditional domain seizures and server takedowns will not stop a blockchain-based C2 channel. Security teams should focus on endpoint detection, behavioral monitoring, and strict application controls to catch suspicious executables early.

Network defenders should evaluate whether outbound connections to known Polygon RPC endpoints can be monitored or restricted without disrupting legitimate operations.

Since infrastructure-level takedowns are no longer reliable against this model, proactive traffic filtering at the network edge remains the most dependable line of defense.

Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.

Read more on Cyber Security News

This news is powered by Cyber Security News Cyber Security News

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Like this:

Like Loading...

Related

Riding the ETH Wave: Easily Earn Thousands in Passive Crypto Income with DEAL Mining – Crypto Economy
Top Crypto Payroll Services in 2025
Spark Exchange Unveils Proprietary High-Performance Matching Engine, Capable of Processing Millions of Transactions Per Second
Hoskinson: Midnight-XRP DeFi Integration Crushes Legacy Banks
6

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
Previous Article Are Flash Loans Legal? Risks & Smart Contract Vulnerabilities
Next Article Polymarket Updates Live Odds for Trading Opportunities | Flash News Detail
© Market Alert News. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Prove your humanity


Lost your password?

%d