Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

TON Price Prediction: $1.50 Target as Technical Indicators Signal Potential 13% Rally

May 2, 2026

The Cheap Foreign Labor Regime Blocking Agricultural Intelligence

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation
DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation
Security

DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation

February 1, 2026No Comments2 Mins Read

A ransomware operation known as DeadLock has been observed abusing Polygon blockchain smart contracts to manage and rotate proxy server addresses.

DeadLock first appeared in July 2025 and has maintained a relatively low profile since then. It is not linked to known ransomware affiliate programs and does not operate a public data leak site.

Despite the limited number of reported victims, Group-IB researchers said its technical approach deserves attention for its novelty and potential reuse by other threat actors.

New DeadLock Infrastructure

The latest DeadLock samples observed by the cybersecurity firm include an HTML file used to communicate with victims through the Session encrypted messaging platform.

Instead of relying on hard-coded servers, the malware retrieves proxy addresses stored inside a Polygon smart contract. 

Group-IB noted that retrieving data from the blockchain relies on read-only calls that do not generate transactions or incur network fees, a design choice that complicates traditional blocking approaches.

The  JavaScript code found within the calls queries a specific Polygon smart contract to obtain the current proxy URL. That proxy then relays encrypted messages between the victim and the attacker’s Session ID.

Key aspects of the approach include:

  • Decentralized storage of proxy addresses on the Polygon blockchain

  • Fallback mechanisms using multiple RPC endpoints

  • Use of smart contract functions to update infrastructure on demand

Read more on blockchain abuse in cybercrime: Malicious npm Packages Exploit Ethereum Smart Contracts

The research also links multiple smart contracts to a single creator wallet, which was funded shortly before deployment. Transaction history shows the same method being used to set new proxy servers over time, suggesting active management of the infrastructure.

See also  PEPE Flatlining at $0.0000045 - Technical Deadlock Points to $0.000006+ Breakout Within 72 Hours

Broader Implications For Defenders

Group-IB said DeadLock also uses AnyDesk as a remote management tool and deploys PowerShell scripts to stop services and delete shadow copies, increasing the impact of encryption.

Victims’ files are renamed with a .dlock extension, and later ransom notes threaten to sell stolen data if payment is not made.

The researchers explained that similar blockchain-based techniques have recently been reported in other campaigns, including cases where smart contracts were used to store malicious payloads or command locations.

While DeadLock remains low volume, its use of Polygon smart contracts demonstrates how decentralized platforms can be repurposed for resilient command-and-control (C2).

The findings suggest that abuse of public blockchains for malware operations is likely to grow, challenging defenders to adapt detection strategies without disrupting legitimate use of decentralized technologies.

Source link

Contracts DeadLock Polygon Proxy ransomware Rotation smart

Related Posts

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026
Top Posts

U.S. Bancorp Marking Time In A Banking Sector That’s Still Out Of Favor

September 26, 2023

Overhead Resistance Stacks up — Bitcoin’s Next Expansion Move Could Be Violent

February 22, 2026

Xumm Issues Critical Warning to XRP Users on Latest Samsung Update

October 24, 2023

Type above and press Enter to search. Press Esc to cancel.