📅 February 28, 2026  |  🔴 Novel C2 Technique  |  Threat Actor: Commodity / CaaS  |  Platform: Windows (Linux variant unconfirmed)

The Aeternum botnet has no C2 servers. No C2 domains. No bulletproof hosting. Its command-and-control infrastructure is the Ethereum blockchain — permanently distributed across thousands of nodes worldwide, cryptographically immutable, and legally untouchable by any law enforcement agency on earth. $1 of MATIC buys 100–150 command transactions. The botnet panel ships for $200.

How Traditional C2 Gets Taken Down

The standard playbook for neutralising a botnet is infrastructure disruption: identify the C2 servers, coordinate with hosting providers or law enforcement to seize them, sinkhole the domains so infected hosts connect to a controlled server instead of the attacker's.

It works. The Emotet botnet was taken down by coordinating takedowns across eight countries in 2021. Qakbot was dismantled by the FBI in 2023 through a similar operation. The disruption playbook is mature, internationally coordinated, and reasonably effective — against centralized infrastructure.

Aeternum doesn't have centralized infrastructure.

The Architecture: Ethereum Smart Contracts as C2

Here's what Aeternum does instead:

When the botnet operator wants to send a command to their infected machines, they don't POST to a C2 server. They write a transaction to a smart contract on the Polygon blockchain. The command is encrypted and stored in the transaction's calldata — permanently and immutably, replicated across every Polygon node worldwide.

The infected machines (bots) don't reach out to a C2 server. They poll public Polygon RPC endpoints — the same endpoints used by millions of legitimate Web3 applications, wallets, and DeFi protocols. They query for new transactions to the attacker's contract address. When a new encrypted command appears, they decrypt it and execute it.

The sequence looks like this:

Attacker wallet
   │
   │  ① Encrypt command with hardcoded bot key
   │  ② Submit tx to smart contract on Polygon
   ▼
Polygon blockchain (distributed — 2,000+ validator nodes)
   │
   │  ③ Transaction confirmed and replicated globally
   ▼
Infected machines polling polygon-rpc.com
   │
   │  ④ Detect new transaction to known contract address
   │  ⑤ Decrypt command → execute
   │  ⑥ Optionally write results back to chain or exfil channel
   ▼
Attacker receives results

Why This Is Resilient by Design

Every property that makes blockchains valuable for finance makes them catastrophic for C2 takedown efforts:

Property Finance use case C2 use case
Immutability Transactions can't be reversed or censored Commands can't be deleted or modified after broadcast
Decentralisation No single point of failure in the network No single server to seize; no hosting provider to contact
Global accessibility Anyone can access the chain from anywhere Bots can reach C2 from any country through any ISP
Low cost Polygon's sub-cent fees enable micro-transactions $1 of MATIC = 100–150 command transactions
Pseudonymity Wallets don't require identity verification Attacker wallet is pseudonymous — hard to attribute

The only control point that defenders or law enforcement have is the attacker's wallet. If the private key is identified, it can theoretically be watched (but not seized). Blockchain forensics firms like Chainalysis can trace transaction patterns. But the C2 transactions themselves — every command ever issued to the botnet — will exist on the Polygon blockchain forever.

The Malware Itself

Aeternum's bot binary is a C++ native executable supporting x32 and x64 Windows architecture. Its capabilities include:

The malware is sold commercially:

At $200, this puts a blockchain-resilient botnet within reach of relatively unsophisticated threat actors. The operator doesn't need to understand smart contracts, Ethereum, or Polygon. They get a panel. They build their bot. The blockchain infrastructure is handled by the malware itself.

Detection: What You Can Actually Do

You cannot take down the C2. You can detect its use.

Network — The Most Reliable Signal

Aeternum bots communicate via Polygon RPC endpoints. In enterprise environments, no workstation or server should ever be making requests to blockchain RPC infrastructure unless it's explicitly part of the software stack (and you'd know if it was).

Block and alert on DNS queries and HTTPS connections to:

# Polygon RPC endpoints to block / alert on:
polygon-rpc.com
rpc.ankr.com/polygon
rpc-mainnet.matic.network
matic.network (wildcard)
bor.blockpi.network
polygonzkevm-mainnet.g.alchemy.com

# JSON-RPC patterns (content inspection if you have it):
Content-Type: application/json to above hosts
POST bodies containing: {"jsonrpc":"2.0","method":"eth_getLogs"...}
POST bodies containing: "to":"0x[40-char-hex]" (smart contract address)

In a zero-trust environment, this traffic should never appear. A single alert on Polygon RPC access from a non-blockchain workstation warrants immediate investigation.

Endpoint Detection

At the endpoint level:

Threat Intel Integration

As Aeternum campaigns are documented, smart contract addresses used for C2 will appear in threat intelligence feeds. Blocking or alerting on connections to known-malicious contract addresses adds another detection layer — though this is inherently reactive rather than preventive.

The Broader Trend: Legitimate Infrastructure as C2

Aeternum is the latest evolution of a well-established attacker strategy: use legitimate, trusted, high-availability infrastructure that defenders can't block without massive collateral damage. We've seen:

The defender's challenge in all these cases is the same: the legitimate platform has millions or billions of legitimate users, so you can't block it wholesale. You have to detect the pattern of use — not the destination, but the behaviour. Regular, structured, automated polling. JSON-RPC calls from unexpected processes. HTTPS to crypto infrastructure from non-crypto systems.

Behavioural detection, network baseline anomalies, and zero-trust egress controls are the answer. Perimeter rules and static blocklists are not.

What This Means for Red Teams

From an offensive security perspective, blockchain C2 is a legitimate technique to understand and test your defences against. Red teams should be:

If your security tools pass zero Polygon RPC traffic to analysts today — that's not because you're safe, it's because you haven't built the detection.

🔍 Further reading: See our coverage of UNC2814's Google Sheets C2 technique for another example of legitimate cloud infrastructure weaponised for command and control. The same defensive principles apply: detect the behaviour, not just the destination.

📚 Recommended Reading

🔗 Related Coverage: Also from the same week's threat intelligence: APT31's supply chain attack via a typosquatted Go module — a different delivery mechanism, same theme of attackers exploiting legitimate infrastructure and development tooling as attack vectors.

Advertisement