Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Ethereum price confirms inverted H&S as staking queue soars

    February 9, 2026

    The DAO hacked again, but this time it’s the good guys

    February 9, 2026

    Fusaka Update – Information for Blob users

    February 9, 2026
    Facebook X (Twitter) Instagram
    Ai Crypto TimesAi Crypto Times
    • Altcoins
      • Bitcoin
      • Coinbase
      • Litecoin
    • Blockchain
    • Crypto
    • Ethereum
    • Lithosphere News Releases
    X (Twitter) Instagram YouTube LinkedIn
    Ai Crypto TimesAi Crypto Times
    Home » DeadLock ransomware abuses Polygon blockchain to rotate proxy servers quietly

    DeadLock ransomware abuses Polygon blockchain to rotate proxy servers quietly

    Isabella TaylorBy Isabella TaylorJanuary 18, 2026No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    DeadLock ransomware abuses Polygon blockchain to rotate proxy servers quietly

    • Group-IB published its report on Jan. 15 and said the method could make disruption harder for defenders.
    • The malware reads on-chain data, so victims do not pay gas fees.
    • Researchers said Polygon is not vulnerable, but the tactic could spread.

    Ransomware groups usually rely on command-and-control servers to manage communications after breaking into a system.

    But security researchers now say a low-profile strain is using blockchain infrastructure in a way that could be harder to block.

    In a report published on Jan. 15, cybersecurity firm Group-IB said a ransomware operation known as DeadLock is abusing Polygon (POL) smart contracts to store and rotate proxy server addresses.

    These proxy servers are used to relay communication between attackers and victims after systems are infected.

    Because the information sits on-chain and can be updated anytime, researchers warned that this approach could make the group’s backend more resilient and tougher to disrupt.

    Smart contracts used to store proxy information

    Group-IB said DeadLock does not depend on the usual setup of fixed command-and-control servers.

    Instead, once a machine is compromised and encrypted, the ransomware queries a specific smart contract deployed on the Polygon network.

    That contract stores the latest proxy address that DeadLock uses to communicate. The proxy acts as a middle layer, helping attackers maintain contact without exposing their main infrastructure directly.

    Since the smart contract data is publicly readable, the malware can retrieve the details without sending any blockchain transactions.

    This also means victims do not need to pay gas fees or interact with wallets.

    DeadLock only reads the information, treating the blockchain as a persistent source of configuration data.

    Rotating infrastructure without malware updates

    One reason this method stands out is how quickly attackers can change their communication routes.

    Group-IB said the actors behind DeadLock can update the proxy address stored inside the contract whenever necessary.

    That gives them the ability to rotate infrastructure without modifying the ransomware itself or pushing new versions into the wild.

    In traditional ransomware cases, defenders can sometimes block traffic by identifying known command-and-control servers.

    But with an on-chain proxy list, any proxy that gets flagged can be replaced simply by updating the contract’s stored value.

    Once contact is established through the updated proxy, victims receive ransom demands along with threats that stolen information will be sold if payment is not made.

    Why takedowns become more difficult

    Group-IB warned that using blockchain data this way makes disruption significantly harder.

    There is no single central server that can be seized, removed, or shut down.

    Even if a specific proxy address is blocked, the attackers can switch to another one without having to redeploy the malware.

    Since the smart contract remains accessible through Polygon’s distributed nodes worldwide, the configuration data can continue to exist even if the infrastructure on the attackers’ side changes.

    Researchers said this gives ransomware operators a more resilient command-and-control mechanism compared with conventional hosting setups.

    A small campaign with an inventive method

    DeadLock was first observed in July 2025 and has stayed relatively low profile so far.

    Group-IB said the operation has only a limited number of confirmed victims.

    The report also noted that DeadLock is not linked to known ransomware affiliate programmes and does not appear to operate a public data leak site.

    While that may explain why the group has received less attention than major ransomware brands, researchers said its technical approach deserves close monitoring.

    Group-IB warned that even if DeadLock remains small, its technique could be copied by more established cybercriminal groups.

    No Polygon vulnerability involved

    The researchers stressed that DeadLock is not exploiting any vulnerability in Polygon itself.

    It is also not attacking third-party smart contracts such as decentralised finance protocols, wallets, or bridges.

    Instead, the attackers are abusing the public and immutable nature of blockchain data to hide configuration information.

    Group-IB compared the technique to earlier “EtherHiding” approaches, where criminals used blockchain networks to distribute malicious configuration data.

    Several smart contracts connected to the campaign were deployed or updated between August and Nov. 2025, according to the firm’s analysis.

    Researchers said the activity remains limited for now, but the concept could be reused in many different forms by other threat actors.

    While Polygon users and developers are not facing direct risk from this specific campaign, Group-IB said the case is another reminder that public blockchains can be misused to support off-chain criminal activity in ways that are difficult to detect and dismantle.


    Share this article

    Categories

    Tags



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Isabella Taylor

    Related Posts

    Common Security Risks in AI Systems — and How to Prevent Them

    February 6, 2026

    How to Hire Top Blockchain Developers in 2026: A Complete Guide

    February 5, 2026

    Success Story: Fadi Tayih’s Learning Journey with 101 Blockchains

    February 2, 2026
    Leave A Reply Cancel Reply

    Don't Miss

    Ethereum price confirms inverted H&S as staking queue soars

    Crypto February 9, 2026

    Ethereum price could be preparing a strong rebound after forming a giant hammer candle and…

    The DAO hacked again, but this time it’s the good guys

    February 9, 2026

    Fusaka Update – Information for Blob users

    February 9, 2026

    Crypto is Europe’s answer to Revolut’s fintech dominance

    February 8, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Our Picks

    Eight Greek islands you may not have heard of – for crowd-free travel

    February 8, 2026

    Karangu Muraya's 2nd wife sparks buzz after sharing ai-generated family image: "Mtoto ni msupuu"

    February 8, 2026

    The incredible Greek island where travellers can escape the tourist crowds – even in peak season

    February 3, 2026

    Litho Forum Introduces a Centralized Platform for Collaboration Across the Lithosphere Network

    January 31, 2026

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    • Popular
    • Recent
    • Top Reviews

    AI-driven phishing scams and hidden crypto exploits shake Web3 security

    November 14, 2025

    Litecoin price prediction: can LTC reclaim $140 amid latest bounce?

    November 14, 2025

    Coinbase launches business platform in Singapore for local startups and SMEs

    November 14, 2025

    Ethereum price confirms inverted H&S as staking queue soars

    February 9, 2026

    The DAO hacked again, but this time it’s the good guys

    February 9, 2026

    Fusaka Update – Information for Blob users

    February 9, 2026
    Latest Galleries
    [latest_gallery cat="all" number="5" type="slider"]
    Latest Reviews
    Demo
    Top Posts

    AGII Deploys Multi-Threaded Decision Layer to Advance High-Speed Blockchain Intelligence

    November 26, 20251 Views

    Eight Greek islands you may not have heard of – for crowd-free travel

    February 8, 20260 Views

    Karangu Muraya's 2nd wife sparks buzz after sharing ai-generated family image: "Mtoto ni msupuu"

    February 8, 20260 Views

    The incredible Greek island where travellers can escape the tourist crowds – even in peak season

    February 3, 20260 Views
    Don't Miss

    Ethereum price confirms inverted H&S as staking queue soars

    Crypto February 9, 2026

    Ethereum price could be preparing a strong rebound after forming a giant hammer candle and…

    The DAO hacked again, but this time it’s the good guys

    February 9, 2026

    Fusaka Update – Information for Blob users

    February 9, 2026

    Crypto is Europe’s answer to Revolut’s fintech dominance

    February 8, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    Top Posts

    Wormhole almost killed Solana DeFi — now works with Blackrock, Hamilton Lane

    December 2, 20254 Views

    Apex Fusion expands to Base with bAP3X token deployment

    December 3, 20253 Views

    FOIA reveals US Marshals sitting on at least $1.6B in BTC

    December 3, 20253 Views

    Kraken buys Backed Finance, expands tokenized stock platform

    December 3, 20253 Views
    Don't Miss

    Ethereum price confirms inverted H&S as staking queue soars

    Crypto February 9, 2026

    Ethereum price could be preparing a strong rebound after forming a giant hammer candle and…

    The DAO hacked again, but this time it’s the good guys

    February 9, 2026

    Fusaka Update – Information for Blob users

    February 9, 2026

    Crypto is Europe’s answer to Revolut’s fintech dominance

    February 8, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    X (Twitter) Instagram YouTube LinkedIn
    Our Picks

    Ethereum price confirms inverted H&S as staking queue soars

    February 9, 2026

    The DAO hacked again, but this time it’s the good guys

    February 9, 2026

    Fusaka Update – Information for Blob users

    February 9, 2026
    Recent Posts
    • Ethereum price confirms inverted H&S as staking queue soars
    • The DAO hacked again, but this time it’s the good guys
    • Fusaka Update – Information for Blob users
    • Crypto is Europe’s answer to Revolut’s fintech dominance
    • Lawsuits are piling up against Binance over Oct. 10
    © 2026 - 2026

    Type above and press Enter to search. Press Esc to cancel.