Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»HACKING NEWS»DeadLock ransomware exploits the Polygon blockchain to silently spin up proxy servers.
HACKING NEWS

DeadLock ransomware exploits the Polygon blockchain to silently spin up proxy servers.

By Crypto FlexsJanuary 19, 20264 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
DeadLock ransomware exploits the Polygon blockchain to silently spin up proxy servers.
Share
Facebook Twitter LinkedIn Pinterest Email

  • Group-IB published a report on January 15 and said the method could make disruption more difficult for defenders.
  • The malware reads on-chain data, so victims do not pay gas fees.
  • Researchers said Polygon is not vulnerable, but the tactic could spread.

Ransomware groups typically use command and control servers to manage communications after infiltrating a system.

But security researchers now say unnoticed variants are using blockchain infrastructure in ways that could be harder to block.

Cybersecurity firm Group-IB said in a report released on January 15 that a ransomware operation known as DeadLock is abusing Polygon (POL) smart contracts to store and rotate proxy server addresses.

These proxy servers are used to relay communications between attackers and victims after the system is infected.

Because the information is on-chain and can be updated at any time, the researchers warned that this approach could make the group’s backend more resilient and harder to disrupt.

Smart contract used to store proxy information

Group-IB said DeadLock does not rely on the typical setup of a fixed command and control server.

Instead, once a system is compromised and encrypted, the ransomware queries specific smart contracts deployed on the Polygon network.

That contract stores the latest proxy address that DeadLock uses for communication. Proxies act as a middle layer, helping attackers maintain contact without directly exposing the underlying infrastructure.

Smart contract data is publicly readable, allowing malware to retrieve details without sending blockchain transactions.

This also means that victims do not need to pay gas fees or interact with their wallets.

DeadLock only reads information and treats the blockchain as a persistent source of configuration data.

Infrastructure rotation without malware updates

One of the reasons this method stands out is how quickly an attacker can change the communication path.

Group-IB said the actor behind DeadLock can update proxy addresses stored within the contract whenever necessary.

This gives them the ability to replace their infrastructure without having to modify the ransomware itself or release new versions.

With traditional ransomware, defenders can sometimes identify known command and control servers and block their traffic.

However, with an on-chain proxy list, any flagged proxy can be replaced simply by updating the stored value of the contract.

Once contact is made through the updated proxy, the victim is presented with a ransom demand and a threat to sell the stolen information if payment is not made.

Why takedowns are becoming more difficult

Group-IB warned that using blockchain data in this way makes disruption much more likely.

There is no single central server that can be taken over, removed, or shut down.

Even if a specific proxy address is blocked, an attacker can switch to another proxy address without redistributing malware.

Smart contracts will remain accessible globally through Polygon’s distributed nodes, allowing configuration data to continue to exist even if the infrastructure on the attacker’s side changes.

Researchers said this gives ransomware operators a more resilient command and control mechanism compared to traditional hosting setups.

Small campaigns with creative methods

DeadLock was first observed in July 2025 and has kept a relatively low profile until now.

Group-IB said the number of confirmed victims in the operation was limited.

The report also notes that DeadLock is not connected to any known ransomware affiliate programs and does not appear to operate any public data exfiltration sites.

While this may explain why the group receives less attention than major ransomware brands, researchers said the group’s technical approach is worth monitoring closely.

Group-IB warned that even though DeadLock is small in scale, its technology could be copied by more established cybercriminal groups.

No polygon vulnerabilities involved

The researchers emphasized that DeadLock does not exploit vulnerabilities in Polygon itself.

It also does not attack third-party smart contracts, such as decentralized finance protocols, wallets, or bridges.

Instead, attackers are abusing the public and immutable nature of blockchain data to hide configuration information.

Group-IB compared this technique to its previous “EtherHiding” approach, in which criminals used blockchain networks to distribute malicious configuration data.

According to the company’s analysis, several smart contracts linked to the campaign were deployed or updated between August and November 2025.

The researchers said that although activity is limited for now, the concept could be reused in various forms by other threat actors.

Although Polygon users and developers do not face direct risk from this particular campaign, Group-IB said this case is another reminder that public blockchains can be misused to support off-chain criminal activity in ways that are difficult to detect and dismantle.


Share this article

Category

tag

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

The fake MetaMask 2FA phishing scam uses a sophisticated design to steal your wallet seed phrase.

February 12, 2026

Altcoin of the Day: Grayscale’s LINK ETF Debuts. HYPE and ASTER soar up to 13%

February 10, 2026

Kamino Lend Fuzz Test Summary

February 8, 2026
Add A Comment

Comments are closed.

Recent Posts

transaction – How to programmatically determine which Tx consumed an OutPoint

February 12, 2026

The fake MetaMask 2FA phishing scam uses a sophisticated design to steal your wallet seed phrase.

February 12, 2026

Dogecoin (DOGE) downtrend, market awaits signal of trend change

February 12, 2026

Phemex Astral Trading League (PATL) Goes Live, Building A Sustainable Seasonal Trading Progression System

February 12, 2026

Cango Inc. Closed The US$10.5 Million Equity Investment And Secured US$65 Million Additional Equity Investments

February 12, 2026

Best Cryptocurrency Marketing Agency: Outset PR Earns Industry Recognition for Data-Driven Approach

February 12, 2026

Flipster FZE Secures In-Principle Approval From VARA, Reinforcing Commitment To Regulated Crypto Access

February 12, 2026

BYDFi Joins Solana Accelerate APAC At Consensus Hong Kong, Expanding Solana Ecosystem Engagement

February 12, 2026

Why the on-chain AI agent economy hasn’t taken off yet

February 12, 2026

P2P Bitcoin marketplace Paxful sentenced for promoting illegal prostitution and money laundering

February 12, 2026

Lucky Anon Casino – The No KYC Crypto Casino With Instant Withdrawals And 7,000+ Games

February 11, 2026

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

transaction – How to programmatically determine which Tx consumed an OutPoint

February 12, 2026

The fake MetaMask 2FA phishing scam uses a sophisticated design to steal your wallet seed phrase.

February 12, 2026

Dogecoin (DOGE) downtrend, market awaits signal of trend change

February 12, 2026
Most Popular

NEXPACE Announces Ecosystem Fund, Deploying Up To $50 Million For MSU Ecosystem Growth And Expansion

November 19, 2025

The best encryption from Italians as the bank promotes BTC at Clear Summit 2025

April 19, 2025

Major Cardano Hard Fork will tell ADA owners in the future of the network.

January 29, 2025
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2026 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.