Aeternum Botnet Uses Polygon Blockchain as Takedown-Proof C2
New botnet loader stores encrypted commands in smart contracts on Polygon, making traditional infrastructure takedowns ineffective. Operating costs are under $1 for 100+ commands.
Security researchers have documented a botnet loader that stores its command-and-control infrastructure on the Polygon blockchain, making traditional takedown efforts effectively impossible. Once commands are written to the chain, they become immutable—no domain seizures, no hosting provider abuse reports, no infrastructure to disrupt.
Aeternum C2, as the malware is called, represents an evolution in how attackers build resilient botnets. Details first emerged in December 2025 when Outpost24's KrakenLabs identified a threat actor named LenAI advertising the toolkit on underground forums.
How Blockchain C2 Works
Traditional botnets communicate with command servers that defenders can identify and take down. Aeternum sidesteps this by using Polygon smart contracts as the command channel:
- Command publication — Operators write encrypted commands to smart contracts deployed on Polygon
- Bot queries — Infected machines query public RPC endpoints to read the blockchain state
- Command execution — Bots decrypt and execute retrieved instructions locally
The blockchain's immutability is the key innovation. Once a command transaction is confirmed on-chain, it cannot be altered or removed by anyone other than the wallet holder. Defenders can't file takedown requests with Polygon—there's no central authority to contact.
According to Qrator Labs' analysis, the operational economics are remarkably cheap: $1 worth of MATIC (Polygon's native token) covers 100 to 150 command transactions. No servers to rent, no domains to register, no hosting providers to evade. The entire C2 infrastructure lives on public blockchain infrastructure that defenders can read but cannot disrupt.
Inside the Aeternum Toolkit
The C2 panel is implemented as a Next.js web application, offering operators a modern interface to manage their botnet:
- Deploy multiple smart contracts simultaneously
- Select contract, command type, and payload URL
- Target all infected endpoints or specific subsets
- Deploy various payloads: clippers, stealers, RATs, cryptominers
The loader itself is native C++ with builds for both 32-bit and 64-bit Windows systems. Anti-analysis features include virtualization detection and integration with Kleenscan for antivirus evasion testing before deployment.
Pricing and Availability
LenAI initially offered two tiers:
- $200 — Panel access plus a configured build
- $4,000 — Complete C++ source code with ongoing updates
By February 2026, LenAI had reportedly attempted to sell the entire toolkit for $10,000, suggesting either an exit from the market or consolidation with other operations. The same threat actor also operates ErrTraffic, a ClickFix automation tool—a pattern we've tracked in previous ClickFix-related malware campaigns.
Why This Matters for Defenders
Traditional botnet takedowns rely on disrupting infrastructure: seizing domains, working with hosting providers to null-route C2 servers, or law enforcement operations against physical infrastructure. Blockchain-based C2 routes around all of these mechanisms.
Defenders can still:
- Block known Polygon RPC endpoints at the network perimeter (though this breaks legitimate blockchain applications)
- Detect and remove the loader from infected endpoints
- Monitor blockchain transactions to the known smart contracts for threat intelligence
- Use the blockchain's public nature to observe commands and prepare defenses
But the asymmetry has shifted. Operators can redeploy using the same contracts even after full remediation of all infected machines—nothing to rebuild, no infrastructure loss from takedowns.
Connection to Broader Malware Trends
Aeternum isn't the first malware to abuse blockchain infrastructure, but it represents a maturation of the technique. Previous blockchain-based C2 implementations were often experimental or unreliable. Aeternum's productized approach—web panel, multiple payload types, anti-analysis features—suggests the technique has crossed into mainstream malware operations.
This evolution parallels other infrastructure innovations we've tracked. The Dohdoor malware campaign similarly abused legitimate infrastructure (DNS-over-HTTPS) to tunnel C2 traffic through channels defenders can't easily block without breaking legitimate functionality. The ColdFusion Christmas attack demonstrated how attackers increasingly leverage distributed infrastructure to evade traditional network-based defenses.
Detection and Monitoring
Organizations should watch for:
- Unusual Polygon RPC traffic — Particularly from endpoints that shouldn't be interacting with blockchain infrastructure
- Known Aeternum indicators — Published IOCs include specific contract addresses and wallet identifiers
- Loader behavioral signatures — Anti-analysis checks, specific process injection techniques, Kleenscan interactions
Endpoint detection remains the primary defense. The blockchain infrastructure can't be taken down, but the malware running on endpoints can be detected and removed. Traditional defenses—EDR, network monitoring, user awareness—still apply; the C2 channel innovation doesn't change the fundamentals of endpoint compromise and remediation.
For security teams tracking the evolving malware landscape, our malware category covers ongoing developments in delivery mechanisms and infrastructure techniques. The Aeternum toolkit's blockchain approach may remain niche, or it may signal a broader shift in how attackers build resilient infrastructure—either way, defenders need to adapt their takedown strategies accordingly.
Related Articles
SSHStalker Botnet Compromises 7,000 Linux Servers via SSH
New Linux botnet SSHStalker infected 7,000 cloud servers using brute-force SSH attacks and 2009-era kernel exploits. Uses IRC for command-and-control while apparently staging for future operations.
Feb 12, 2026FBI: BadBox 2.0 Malware Pre-Installed on 1M+ Android Devices
Budget Android TV boxes and tablets ship with backdoors from the factory, turning home networks into criminal infrastructure for ad fraud and proxy services.
Jan 18, 2026RondoDox Botnet Targets 90K Servers via React2Shell
Nine-month-old botnet campaign pivots to exploit CVE-2025-55182 in Next.js, deploying cryptominers and Mirai variants across exposed instances.
Jan 4, 2026Kimwolf Botnet Hijacks 1.8 Million Android TV Boxes for DDoS Attacks
Massive Android botnet targets set-top boxes and tablets, issued 1.7 billion attack commands in 3 days, briefly surpassing Google in DNS rankings.
Dec 19, 2025