Malware & RansomwareHIGH

Aeternum Botnet Uses Blockchain to Outsmart Takedown Efforts

THThe Hacker NewsFeb 26, 2026
AeternumbotnetPolygonC2Qrator Labs
🎯

Basically, a new botnet hides its commands on a blockchain to avoid being shut down.

Quick Summary

A new botnet named Aeternum is using blockchain to hide its commands, making it harder to shut down. This affects anyone with internet-connected devices, as it poses risks of data theft and disruption. Cybersecurity experts are urging users to update their defenses and stay vigilant.

What Happened

A groundbreaking shift in cybercrime tactics has emerged with the Aeternum C2 botnet. Researchers recently uncovered that this botnet is using a blockchain-based command-and-control (C2)? system. Instead of the usual servers or domains, Aeternum cleverly stores its commands on the public Polygon blockchain. This innovation makes it significantly harder for authorities to dismantle its operations.

The report from Qrator Labs highlights how Aeternum's use of blockchain technology not only enhances its resilience but also allows it to operate in a decentralized manner. By leveraging the immutable nature of blockchain, the botnet can avoid traditional takedown methods that rely on targeting specific servers or domains. This development raises serious concerns for cybersecurity professionals?, as it signals a new era of sophisticated cyber threats.

Why Should You Care

Imagine if your favorite app suddenly became unresponsive, not because of a glitch, but because a cybercriminal was using it to control a network of infected devices. This is the reality with botnets like Aeternum. They can hijack your devices, potentially leading to data theft or worse.

Your personal information could be at risk if your devices are part of such a network. The implications extend beyond individual users; businesses could face significant disruptions and financial losses. Just like a thief who can’t be caught because they hide their loot in a safe place, Aeternum’s use of blockchain makes it elusive and dangerous.

What's Being Done

Cybersecurity experts are on high alert as they analyze the Aeternum botnet. Here are some immediate actions being recommended:

  • Update your security software to the latest versions to protect against known vulnerabilities.
  • Monitor your devices for unusual activity that could indicate infection.
  • Educate yourself and your team about the risks of botnets and how to recognize suspicious behavior.

Experts are particularly watching for how this technology might inspire other cybercriminals. The potential for copycat botnets using similar tactics is a real concern. Keeping your defenses strong is more crucial than ever.

💡 Tap dotted terms for explanations

🔒 Pro insight: Aeternum's use of blockchain for C2 operations represents a significant evolution in botnet resilience, complicating traditional mitigation strategies.

Original article from

The Hacker News

Read Full Article

Related Pings

HIGHMalware & Ransomware

ClickFix Attackers Evolve Tactics to Bypass Security Measures

Microsoft warns about a new ClickFix phishing tactic. Attackers are tricking users into executing harmful commands via Windows Terminal. This method can compromise your data and security. Stay alert and educate yourself on these evolving threats!

CSO Online·Yesterday, 9:15 PM
HIGHMalware & Ransomware

Fake Google Meet Update Gives Attackers Control of Your PC

A fake Google Meet update is tricking users into giving hackers control of their PCs. This poses a serious risk to personal and sensitive data. Stay vigilant and avoid suspicious update prompts to protect yourself.

Malwarebytes Labs·Yesterday, 7:35 PM
HIGHMalware & Ransomware

Spyware Masquerades as Emergency App Targeting Israeli Smartphones

Israeli smartphones were targeted by spyware disguised as an emergency app. This deceptive tactic puts personal data at risk. Stay vigilant and verify app legitimacy to protect your privacy.

The Register Security·Yesterday, 6:56 PM
HIGHMalware & Ransomware

Metasploit Update: New Exploits and Enhanced Control Features

Metasploit has launched a new update with powerful exploits and features. Users of Tactical RMM and MajorDoMo are particularly at risk. Stay ahead of potential attacks by updating your systems and reviewing security measures.

Rapid7 Blog·Yesterday, 6:28 PM
HIGHMalware & Ransomware

New ClickFix Attack Uses Windows Terminal for Malicious Payloads

A new wave of ClickFix attacks targets Windows Terminal to deliver malicious payloads. Users are at risk of unauthorized access and data theft. Stay cautious and keep your software updated to protect yourself.

Cyber Security News·Yesterday, 6:05 PM
HIGHMalware & Ransomware

AI-Powered Malware: Transparent Tribe Targets India

A hacking group is using AI to create malware targeting India. This mass production of implants could compromise personal data and financial security. Experts recommend updating software and using strong passwords to protect against these threats.

The Hacker News·Yesterday, 3:11 PM