Malware & RansomwareHIGH

Aeternum Botnet Uses Blockchain to Outsmart Takedown Efforts

THThe Hacker NewsFeb 26, 2026
AeternumbotnetPolygonC2Qrator Labs
🎯

Basically, a new botnet hides its commands on a blockchain to avoid being shut down.

Quick Summary

A new botnet named Aeternum is using blockchain to hide its commands, making it harder to shut down. This affects anyone with internet-connected devices, as it poses risks of data theft and disruption. Cybersecurity experts are urging users to update their defenses and stay vigilant.

What Happened

A groundbreaking shift in cybercrime tactics has emerged with the Aeternum C2 botnet. Researchers recently uncovered that this botnet is using a blockchain-based command-and-control (C2)? system. Instead of the usual servers or domains, Aeternum cleverly stores its commands on the public Polygon blockchain. This innovation makes it significantly harder for authorities to dismantle its operations.

The report from Qrator Labs highlights how Aeternum's use of blockchain technology not only enhances its resilience but also allows it to operate in a decentralized manner. By leveraging the immutable nature of blockchain, the botnet can avoid traditional takedown methods that rely on targeting specific servers or domains. This development raises serious concerns for cybersecurity professionals?, as it signals a new era of sophisticated cyber threats.

Why Should You Care

Imagine if your favorite app suddenly became unresponsive, not because of a glitch, but because a cybercriminal was using it to control a network of infected devices. This is the reality with botnets like Aeternum. They can hijack your devices, potentially leading to data theft or worse.

Your personal information could be at risk if your devices are part of such a network. The implications extend beyond individual users; businesses could face significant disruptions and financial losses. Just like a thief who can’t be caught because they hide their loot in a safe place, Aeternum’s use of blockchain makes it elusive and dangerous.

What's Being Done

Cybersecurity experts are on high alert as they analyze the Aeternum botnet. Here are some immediate actions being recommended:

  • Update your security software to the latest versions to protect against known vulnerabilities.
  • Monitor your devices for unusual activity that could indicate infection.
  • Educate yourself and your team about the risks of botnets and how to recognize suspicious behavior.

Experts are particularly watching for how this technology might inspire other cybercriminals. The potential for copycat botnets using similar tactics is a real concern. Keeping your defenses strong is more crucial than ever.

💡 Tap dotted terms for explanations

🔒 Pro insight: Aeternum's use of blockchain for C2 operations represents a significant evolution in botnet resilience, complicating traditional mitigation strategies.

Original article from

The Hacker News

Read Full Article

Related Pings

HIGHMalware & Ransomware

Ransomware Groups Shift Tactics Amid Declining Profits

Ransomware groups are adapting their tactics due to declining profits. With a 47% increase in attacks, everyone is at risk. Stay informed and protect yourself from these evolving threats.

Recorded Future Blog·Jan 5, 2026
HIGHMalware & Ransomware

Ransomware Leader Pleads Guilty, Faces 20 Years Behind Bars

The leader of the Phobos ransomware gang has pleaded guilty, impacting over 1,000 victims worldwide. This case highlights the serious threat of ransomware and the importance of cybersecurity. Authorities are working to dismantle the remaining gang members and prevent future attacks.

CyberScoop·Mar 5, 2026
HIGHMalware & Ransomware

Shai-Hulud Worm 2.0 Escalates Supply Chain Attacks

A new worm named Shai-Hulud is targeting the Node.js ecosystem, escalating risks for developers and users. This attack could compromise trusted software, leading to data theft and financial losses. Stay updated and secure your code to protect against this emerging threat.

Intel 471 Blog·Dec 10, 2025
HIGHMalware & Ransomware

Ransomware Alert: Lessons from Clop's Cyber Attacks

Clop's recent attacks highlight the urgent need for businesses to strengthen their ransomware defenses. With the threat of data leaks and financial loss, every organization is at risk. Now is the time to prepare and protect your data.

Flashpoint Blog·Jun 27, 2023
HIGHMalware & Ransomware

Malicious Updates Target eScan Antivirus in Supply Chain Attack

A supply chain attack has compromised eScan antivirus updates with malware. Users are at risk of data breaches and compromised security. Kaspersky is providing guidance to help detect and mitigate the threat.

Kaspersky Securelist·Jan 29, 2026
HIGHMalware & Ransomware

Keenadu Backdoor Exposes Major Android Botnet Connections

Kaspersky has uncovered Keenadu, a new backdoor targeting Android devices. This threat connects major botnets, putting millions at risk. Users should update their devices and be cautious with app downloads.

Kaspersky Securelist·Feb 17, 2026
Aeternum Botnet Uses Blockchain to Outsmart Takedown Efforts | CyberPings Cybersecurity News