Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation

January 14, 2026

The Hype We Can Ignore (And the Risks We Can’t)

January 14, 2026

Hackers Use Fake PayPal Notices to Steal Credentials, Deploy RMMs

January 14, 2026
Facebook X (Twitter) Instagram
Thursday, January 15
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation
News

DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation

Team-CWDBy Team-CWDJanuary 14, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A ransomware operation known as DeadLock has been observed abusing Polygon blockchain smart contracts to manage and rotate proxy server addresses.

DeadLock first appeared in July 2025 and has maintained a relatively low profile since then. It is not linked to known ransomware affiliate programs and does not operate a public data leak site.

Despite the limited number of reported victims, Group-IB researchers said its technical approach deserves attention for its novelty and potential reuse by other threat actors.

New DeadLock Infrastructure

The latest DeadLock samples observed by the cybersecurity firm include an HTML file used to communicate with victims through the Session encrypted messaging platform.

Instead of relying on hard-coded servers, the malware retrieves proxy addresses stored inside a Polygon smart contract. 

Group-IB noted that retrieving data from the blockchain relies on read-only calls that do not generate transactions or incur network fees, a design choice that complicates traditional blocking approaches.

The  JavaScript code found within the calls queries a specific Polygon smart contract to obtain the current proxy URL. That proxy then relays encrypted messages between the victim and the attacker’s Session ID.

Key aspects of the approach include:

  • Decentralized storage of proxy addresses on the Polygon blockchain

  • Fallback mechanisms using multiple RPC endpoints

  • Use of smart contract functions to update infrastructure on demand

Read more on blockchain abuse in cybercrime: Malicious npm Packages Exploit Ethereum Smart Contracts

The research also links multiple smart contracts to a single creator wallet, which was funded shortly before deployment. Transaction history shows the same method being used to set new proxy servers over time, suggesting active management of the infrastructure.

Broader Implications For Defenders

Group-IB said DeadLock also uses AnyDesk as a remote management tool and deploys PowerShell scripts to stop services and delete shadow copies, increasing the impact of encryption.

Victims’ files are renamed with a .dlock extension, and later ransom notes threaten to sell stolen data if payment is not made.

The researchers explained that similar blockchain-based techniques have recently been reported in other campaigns, including cases where smart contracts were used to store malicious payloads or command locations.

While DeadLock remains low volume, its use of Polygon smart contracts demonstrates how decentralized platforms can be repurposed for resilient command-and-control (C2).

The findings suggest that abuse of public blockchains for malware operations is likely to grow, challenging defenders to adapt detection strategies without disrupting legitimate use of decentralized technologies.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe Hype We Can Ignore (And the Risks We Can’t)
Team-CWD
  • Website

Related Posts

News

The Hype We Can Ignore (And the Risks We Can’t)

January 14, 2026
News

Criminal Subscription Service Behind AI-Powered Cyber-Attacks Taken Out By Microsoft

January 14, 2026
News

Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions

January 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How to help older family members avoid scams

October 31, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.