Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»HACKING NEWS»DeadLock ransomware exploits the Polygon blockchain to silently spin up proxy servers.
HACKING NEWS

DeadLock ransomware exploits the Polygon blockchain to silently spin up proxy servers.

By Crypto FlexsJanuary 19, 20264 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
DeadLock ransomware exploits the Polygon blockchain to silently spin up proxy servers.
Share
Facebook Twitter LinkedIn Pinterest Email

  • Group-IB published a report on January 15 and said the method could make disruption more difficult for defenders.
  • The malware reads on-chain data, so victims do not pay gas fees.
  • Researchers said Polygon is not vulnerable, but the tactic could spread.

Ransomware groups typically use command and control servers to manage communications after infiltrating a system.

But security researchers now say unnoticed variants are using blockchain infrastructure in ways that could be harder to block.

Cybersecurity firm Group-IB said in a report released on January 15 that a ransomware operation known as DeadLock is abusing Polygon (POL) smart contracts to store and rotate proxy server addresses.

These proxy servers are used to relay communications between attackers and victims after the system is infected.

Because the information is on-chain and can be updated at any time, the researchers warned that this approach could make the group’s backend more resilient and harder to disrupt.

Smart contract used to store proxy information

Group-IB said DeadLock does not rely on the typical setup of a fixed command and control server.

Instead, once a system is compromised and encrypted, the ransomware queries specific smart contracts deployed on the Polygon network.

That contract stores the latest proxy address that DeadLock uses for communication. Proxies act as a middle layer, helping attackers maintain contact without directly exposing the underlying infrastructure.

Smart contract data is publicly readable, allowing malware to retrieve details without sending blockchain transactions.

This also means that victims do not need to pay gas fees or interact with their wallets.

DeadLock only reads information and treats the blockchain as a persistent source of configuration data.

Infrastructure rotation without malware updates

One of the reasons this method stands out is how quickly an attacker can change the communication path.

Group-IB said the actor behind DeadLock can update proxy addresses stored within the contract whenever necessary.

This gives them the ability to replace their infrastructure without having to modify the ransomware itself or release new versions.

With traditional ransomware, defenders can sometimes identify known command and control servers and block their traffic.

However, with an on-chain proxy list, any flagged proxy can be replaced simply by updating the stored value of the contract.

Once contact is made through the updated proxy, the victim is presented with a ransom demand and a threat to sell the stolen information if payment is not made.

Why takedowns are becoming more difficult

Group-IB warned that using blockchain data in this way makes disruption much more likely.

There is no single central server that can be taken over, removed, or shut down.

Even if a specific proxy address is blocked, an attacker can switch to another proxy address without redistributing malware.

Smart contracts will remain accessible globally through Polygon’s distributed nodes, allowing configuration data to continue to exist even if the infrastructure on the attacker’s side changes.

Researchers said this gives ransomware operators a more resilient command and control mechanism compared to traditional hosting setups.

Small campaigns with creative methods

DeadLock was first observed in July 2025 and has kept a relatively low profile until now.

Group-IB said the number of confirmed victims in the operation was limited.

The report also notes that DeadLock is not connected to any known ransomware affiliate programs and does not appear to operate any public data exfiltration sites.

While this may explain why the group receives less attention than major ransomware brands, researchers said the group’s technical approach is worth monitoring closely.

Group-IB warned that even though DeadLock is small in scale, its technology could be copied by more established cybercriminal groups.

No polygon vulnerabilities involved

The researchers emphasized that DeadLock does not exploit vulnerabilities in Polygon itself.

It also does not attack third-party smart contracts, such as decentralized finance protocols, wallets, or bridges.

Instead, attackers are abusing the public and immutable nature of blockchain data to hide configuration information.

Group-IB compared this technique to its previous “EtherHiding” approach, in which criminals used blockchain networks to distribute malicious configuration data.

According to the company’s analysis, several smart contracts linked to the campaign were deployed or updated between August and November 2025.

The researchers said that although activity is limited for now, the concept could be reused in various forms by other threat actors.

Although Polygon users and developers do not face direct risk from this particular campaign, Group-IB said this case is another reminder that public blockchains can be misused to support off-chain criminal activity in ways that are difficult to detect and dismantle.


Share this article

Category

tag

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Vault12 Guard 2.8 provides real-time portfolio balance for cryptocurrency inheritance

March 18, 2026

Omnipair Loan Audit Summary – Ackee Blockchain

March 8, 2026

Is Vault12 Review 2025 worth using?

March 6, 2026
Add A Comment

Comments are closed.

Recent Posts

Bitcoin faces worst six-month decline since 2018, five takeaways

March 30, 2026

With Bitcoin price falling below $70,000, sellers expect further declines.

March 29, 2026

tools, steps, and pro tips

March 29, 2026

AAVE Price Prediction: $102-105 Recovery Targeted by April 2026

March 29, 2026

Why TRON Price Has Been Bearish Despite Anchorage Digital Adding Institutional TRX Storage

March 28, 2026

Bitcoin Reacts Quickly, Markets Still Cautious

March 27, 2026

The Ethereum network has seen a sharp increase in daily transactions due to the rise in the price of ETH.

March 27, 2026

Bitmine Crypto Strategy Tracking: How much Bitcoin and Ethereum does the company hold?

March 26, 2026

Dogecoin (DOGE) stalls in range, bulls fail to capture momentum

March 26, 2026

Why ZenMine Chose Liquid Cooling For Its Mining Infrastructure

March 26, 2026

T-REX Network And Zama Launch Institutional-Grade Confidentiality Infrastructure For RWA Tokenization

March 26, 2026

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

Bitcoin faces worst six-month decline since 2018, five takeaways

March 30, 2026

With Bitcoin price falling below $70,000, sellers expect further declines.

March 29, 2026

tools, steps, and pro tips

March 29, 2026
Most Popular

Bitcoin Treasury: Effects on stock performance and market volatility

March 3, 2025

Bitcoin Maximalist Samson Mow identifies a Godzilla candle scenario for BTC.

June 9, 2024

Transaction – Spending Security

May 5, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2026 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.