Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»HACKING NEWS»DeadLock ransomware exploits the Polygon blockchain to silently spin up proxy servers.
HACKING NEWS

DeadLock ransomware exploits the Polygon blockchain to silently spin up proxy servers.

By Crypto FlexsJanuary 19, 20264 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
DeadLock ransomware exploits the Polygon blockchain to silently spin up proxy servers.
Share
Facebook Twitter LinkedIn Pinterest Email

  • Group-IB published a report on January 15 and said the method could make disruption more difficult for defenders.
  • The malware reads on-chain data, so victims do not pay gas fees.
  • Researchers said Polygon is not vulnerable, but the tactic could spread.

Ransomware groups typically use command and control servers to manage communications after infiltrating a system.

But security researchers now say unnoticed variants are using blockchain infrastructure in ways that could be harder to block.

Cybersecurity firm Group-IB said in a report released on January 15 that a ransomware operation known as DeadLock is abusing Polygon (POL) smart contracts to store and rotate proxy server addresses.

These proxy servers are used to relay communications between attackers and victims after the system is infected.

Because the information is on-chain and can be updated at any time, the researchers warned that this approach could make the group’s backend more resilient and harder to disrupt.

Smart contract used to store proxy information

Group-IB said DeadLock does not rely on the typical setup of a fixed command and control server.

Instead, once a system is compromised and encrypted, the ransomware queries specific smart contracts deployed on the Polygon network.

That contract stores the latest proxy address that DeadLock uses for communication. Proxies act as a middle layer, helping attackers maintain contact without directly exposing the underlying infrastructure.

Smart contract data is publicly readable, allowing malware to retrieve details without sending blockchain transactions.

This also means that victims do not need to pay gas fees or interact with their wallets.

DeadLock only reads information and treats the blockchain as a persistent source of configuration data.

Infrastructure rotation without malware updates

One of the reasons this method stands out is how quickly an attacker can change the communication path.

Group-IB said the actor behind DeadLock can update proxy addresses stored within the contract whenever necessary.

This gives them the ability to replace their infrastructure without having to modify the ransomware itself or release new versions.

With traditional ransomware, defenders can sometimes identify known command and control servers and block their traffic.

However, with an on-chain proxy list, any flagged proxy can be replaced simply by updating the stored value of the contract.

Once contact is made through the updated proxy, the victim is presented with a ransom demand and a threat to sell the stolen information if payment is not made.

Why takedowns are becoming more difficult

Group-IB warned that using blockchain data in this way makes disruption much more likely.

There is no single central server that can be taken over, removed, or shut down.

Even if a specific proxy address is blocked, an attacker can switch to another proxy address without redistributing malware.

Smart contracts will remain accessible globally through Polygon’s distributed nodes, allowing configuration data to continue to exist even if the infrastructure on the attacker’s side changes.

Researchers said this gives ransomware operators a more resilient command and control mechanism compared to traditional hosting setups.

Small campaigns with creative methods

DeadLock was first observed in July 2025 and has kept a relatively low profile until now.

Group-IB said the number of confirmed victims in the operation was limited.

The report also notes that DeadLock is not connected to any known ransomware affiliate programs and does not appear to operate any public data exfiltration sites.

While this may explain why the group receives less attention than major ransomware brands, researchers said the group’s technical approach is worth monitoring closely.

Group-IB warned that even though DeadLock is small in scale, its technology could be copied by more established cybercriminal groups.

No polygon vulnerabilities involved

The researchers emphasized that DeadLock does not exploit vulnerabilities in Polygon itself.

It also does not attack third-party smart contracts, such as decentralized finance protocols, wallets, or bridges.

Instead, attackers are abusing the public and immutable nature of blockchain data to hide configuration information.

Group-IB compared this technique to its previous “EtherHiding” approach, in which criminals used blockchain networks to distribute malicious configuration data.

According to the company’s analysis, several smart contracts linked to the campaign were deployed or updated between August and November 2025.

The researchers said that although activity is limited for now, the concept could be reused in various forms by other threat actors.

Although Polygon users and developers do not face direct risk from this particular campaign, Group-IB said this case is another reminder that public blockchains can be misused to support off-chain criminal activity in ways that are difficult to detect and dismantle.


Share this article

Category

tag

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Ripple extends its RLUSD stablecoin to the Ethereum Layer 2 network.

January 17, 2026

Wake Debugging Guide: Python-Based Robustness Testing

January 15, 2026

Vault12 open source WebAuthn/Passkey support for Electron on macOS: Enable Touch ID and iCloud Keychain in hybrid desktop apps

January 13, 2026
Add A Comment

Comments are closed.

Recent Posts

Do you have at least 10,000 XRP? An expert reveals what this means for you.

January 19, 2026

DeadLock ransomware exploits the Polygon blockchain to silently spin up proxy servers.

January 19, 2026

3-Wave Correction Sets XRP Price on Bearish Course

January 19, 2026

Husky Inu AI (HINU) was set at $0.00025441, sending the cryptocurrency market trading slightly lower and the spot Bitcoin ETF posting its strongest week since October.

January 19, 2026

Cardano price has hit a supply wall near $0.40. Can the ADA maintain support?

January 18, 2026

Hegota Upgrade EIP Proposal Schedule

January 18, 2026

XRP chart indicates a bullish divergence signal. Ripple aims to reignite market confidence and usher in a new altcoin cycle.

January 18, 2026

Ripple extends its RLUSD stablecoin to the Ethereum Layer 2 network.

January 17, 2026

Trump Shakes Up Fed Chair Race: Who Will Replace Powell?

January 17, 2026

XRP ETF inflows hit $17 million as total assets surged past $1.5 billion.

January 16, 2026

Debut VR Concerts On The Ultimate Web3 Entertainment Platform

January 16, 2026

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

Do you have at least 10,000 XRP? An expert reveals what this means for you.

January 19, 2026

DeadLock ransomware exploits the Polygon blockchain to silently spin up proxy servers.

January 19, 2026

3-Wave Correction Sets XRP Price on Bearish Course

January 19, 2026
Most Popular

Evolution of logistics solutions for transportation of harmful goods: sacred corporate strategy

March 14, 2025

Injective (INJ) Community Update Highlighting July Milestones

August 6, 2024

HTX Global Advisor Justin Sun advocates encryption security collaboration.

February 23, 2025
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2026 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.