·

Aeternum C2 Botnet Abuses Polygon Blockchain to Hide Malware Commands and Evade Takedowns

Reza Rafati Avatar
4–6 minutes

Cybersecurity researchers have uncovered a new malware loader and botnet infrastructure called Aeternum C2 that hides its command-and-control instructions inside the Polygon blockchain. By embedding encrypted commands on a public blockchain network instead of traditional servers or domains, the operators behind the malware dramatically increase the resilience of their infrastructure and make takedown efforts significantly more difficult.

The technique represents a growing trend in malware development where threat actors move away from centralized command infrastructure and toward decentralized platforms that are inherently resistant to disruption. Public blockchains, decentralized storage networks, and legitimate cloud services are increasingly being abused as covert communication channels for botnets and remote access malware.

Security researchers warn that this shift toward blockchain-based command-and-control could complicate traditional defense strategies, which typically rely on blocking malicious domains, sinkholing servers, or disrupting attacker-controlled infrastructure.

How Aeternum Uses the Polygon Blockchain for Command-and-Control

Unlike traditional botnets that rely on attacker-controlled servers or domain infrastructure, Aeternum retrieves its instructions from data stored on the Polygon blockchain. Researchers say the malware queries specific blockchain transactions where encrypted payloads are embedded within publicly accessible data fields.

Because blockchains are decentralized and replicated across thousands of nodes, removing malicious data from them is nearly impossible once it has been recorded. This gives attackers a highly durable communication channel that cannot easily be seized, sinkholed, or blocked through standard domain takedown operations.

When an infected machine runs the loader, it connects to the blockchain network and parses transactions associated with predefined wallet addresses or identifiers. The malware then decrypts the embedded data to retrieve instructions, which may include commands to download additional payloads, update configuration settings, or join broader botnet activity.

This architecture effectively separates the attacker from direct infrastructure control, allowing threat actors to maintain command channels without hosting servers that defenders can shut down.

Why Blockchain-Based C2 Infrastructure Is Concerning

The use of blockchain technology for command-and-control infrastructure introduces a new set of challenges for defenders. Traditional botnet disruption strategies rely on identifying malicious domains, seizing command servers, or sinkholing attacker infrastructure. In decentralized environments, those options become far less effective.

Because public blockchains are designed to be immutable and distributed across thousands of nodes, once malicious data is written to the chain it cannot easily be removed. Even if security teams identify the wallet addresses or transactions used by attackers, the underlying data will remain accessible to infected systems that know where to look.

Researchers warn that threat actors are increasingly experimenting with decentralized technologies—including blockchains, peer-to-peer networks, and distributed storage platforms—as resilient communication channels for malware operations. These platforms provide built-in redundancy and anonymity while also blending malicious traffic with legitimate network activity.

The approach also complicates attribution and response efforts, since defenders cannot simply dismantle the infrastructure supporting the malware campaign.

Detection and Defensive Considerations

Although blockchain-based command infrastructure is difficult to dismantle, defenders can still detect and disrupt malware activity at other points in the attack chain. Security teams should monitor unusual outbound connections, abnormal blockchain queries from endpoints that normally do not interact with cryptocurrency networks, and suspicious processes that parse transaction data.

Endpoint detection and response (EDR) platforms can also help identify malicious loaders attempting to retrieve commands from external sources. Behavioral analysis, memory inspection, and anomaly detection remain effective methods for catching malware regardless of the infrastructure used for command delivery.

Organizations should also implement strict application controls and monitor PowerShell, scripting environments, and unknown executable downloads that could be used to deploy loaders such as Aeternum. Network defenders may also consider flagging unexpected access to blockchain APIs or RPC endpoints originating from enterprise systems.

The emergence of threats like Aeternum highlights how attackers continue to adapt infrastructure strategies to evade traditional countermeasures. As decentralized technologies become more widespread, defenders will increasingly need to monitor the abuse of legitimate platforms as covert channels for malware command-and-control.

The Rise of Decentralized Malware Infrastructure

The Aeternum campaign reflects a broader shift in how threat actors design command-and-control infrastructure. Over the past several years, researchers have documented multiple attempts to move malware communications away from traditional centralized servers toward decentralized platforms that are significantly harder to disrupt.

In previous incidents, attackers have experimented with storing malware instructions inside blockchain transactions, distributing payloads through the InterPlanetary File System (IPFS), and using peer-to-peer communication protocols to maintain botnet control even when parts of the infrastructure are taken offline.

These approaches provide several advantages for attackers. Decentralized networks offer built-in redundancy, global distribution, and infrastructure that cannot easily be seized by law enforcement. Once malicious data is embedded in a public ledger or distributed storage system, removing it can be extremely difficult.

Security analysts increasingly warn that decentralized technologies could become a long-term component of modern malware ecosystems. As blockchain adoption grows and decentralized platforms become more widely integrated into legitimate software environments, threat actors may continue to abuse these systems to create resilient command channels for botnets, remote access trojans, and data exfiltration tools.

Why Attackers Are Experimenting with Blockchain-Based Command and Control

Security researchers say attackers are increasingly testing blockchain-based command-and-control (C2) techniques because decentralized networks provide resilience that traditional infrastructure cannot easily match. Unlike conventional botnet servers that can be seized or sinkholed, blockchain data is replicated across a distributed network, allowing malware operators to store instructions in a way that is difficult to remove or disrupt.

This tactic has appeared in several earlier campaigns where malware leveraged cryptocurrency ecosystems for operational resilience. In one case, researchers observed malware families abusing the Ethereum blockchain to maintain command-and-control channels, demonstrating how public ledger platforms can function as covert communication layers for threat actors.

The emergence of Aeternum suggests this technique is continuing to evolve. As blockchain ecosystems expand and more applications integrate decentralized infrastructure, defenders may increasingly encounter malware that blends malicious activity with legitimate blockchain traffic.

Tags