Thursday, January 22, 2026
No Result
View All Result
The Crypto HODL
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
Marketcap
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
No Result
View All Result
The Crypto HODL
No Result
View All Result

DeadLock ransomware abuses Polygon blockchain to rotate proxy servers quietly

January 18, 2026
in Scam Alert
Reading Time: 4 mins read
0 0
A A
0
Home Scam Alert
Share on FacebookShare on Twitter


Group-IB printed its report on Jan. 15 and mentioned the tactic may make disruption tougher for defenders.
The malware reads on-chain knowledge, so victims don’t pay fuel charges.
Researchers mentioned Polygon just isn’t weak, however the tactic may unfold.

Ransomware teams often depend on command-and-control servers to handle communications after breaking right into a system.

However safety researchers now say a low-profile pressure is utilizing blockchain infrastructure in a method that might be tougher to dam.

In a report printed on Jan. 15, cybersecurity agency Group-IB mentioned a ransomware operation generally known as DeadLock is abusing Polygon (POL) good contracts to retailer and rotate proxy server addresses.

These proxy servers are used to relay communication between attackers and victims after methods are contaminated.

As a result of the knowledge sits on-chain and might be up to date anytime, researchers warned that this method may make the group’s backend extra resilient and more durable to disrupt.

Good contracts used to retailer proxy info

Group-IB mentioned DeadLock doesn’t rely on the same old setup of fastened command-and-control servers.

As an alternative, as soon as a machine is compromised and encrypted, the ransomware queries a particular good contract deployed on the Polygon community.

That contract shops the most recent proxy tackle that DeadLock makes use of to speak. The proxy acts as a center layer, serving to attackers keep contact with out exposing their most important infrastructure straight.

Because the good contract knowledge is publicly readable, the malware can retrieve the small print with out sending any blockchain transactions.

This additionally means victims don’t must pay fuel charges or work together with wallets.

DeadLock solely reads the knowledge, treating the blockchain as a persistent supply of configuration knowledge.

Rotating infrastructure with out malware updates

One motive this methodology stands out is how shortly attackers can change their communication routes.

Group-IB mentioned the actors behind DeadLock can replace the proxy tackle saved contained in the contract every time obligatory.

That offers them the flexibility to rotate infrastructure with out modifying the ransomware itself or pushing new variations into the wild.

In conventional ransomware circumstances, defenders can typically block site visitors by figuring out identified command-and-control servers.

However with an on-chain proxy record, any proxy that will get flagged might be changed just by updating the contract’s saved worth.

As soon as contact is established via the up to date proxy, victims obtain ransom calls for together with threats that stolen info will likely be offered if fee just isn’t made.

Why takedowns develop into tougher

Group-IB warned that utilizing blockchain knowledge this manner makes disruption considerably tougher.

There isn’t a single central server that may be seized, eliminated, or shut down.

Even when a particular proxy tackle is blocked, the attackers can swap to a different one with out having to redeploy the malware.

Because the good contract stays accessible via Polygon’s distributed nodes worldwide, the configuration knowledge can live on even when the infrastructure on the attackers’ facet adjustments.

Researchers mentioned this offers ransomware operators a extra resilient command-and-control mechanism in contrast with standard internet hosting setups.

A small marketing campaign with an ingenious methodology

DeadLock was first noticed in July 2025 and has stayed comparatively low profile up to now.

Group-IB mentioned the operation has solely a restricted variety of confirmed victims.

The report additionally famous that DeadLock just isn’t linked to identified ransomware affiliate programmes and doesn’t seem to function a public knowledge leak web site.

Whereas that will clarify why the group has obtained much less consideration than main ransomware manufacturers, researchers mentioned its technical method deserves shut monitoring.

Group-IB warned that even when DeadLock stays small, its approach might be copied by extra established cybercriminal teams.

No Polygon vulnerability concerned

The researchers burdened that DeadLock just isn’t exploiting any vulnerability in Polygon itself.

It’s also not attacking third-party good contracts akin to decentralised finance protocols, wallets, or bridges.

As an alternative, the attackers are abusing the general public and immutable nature of blockchain knowledge to cover configuration info.

Group-IB in contrast the approach to earlier “EtherHiding” approaches, the place criminals used blockchain networks to distribute malicious configuration knowledge.

A number of good contracts related to the marketing campaign have been deployed or up to date between August and Nov. 2025, in response to the agency’s evaluation.

Researchers mentioned the exercise stays restricted for now, however the idea might be reused in many alternative kinds by different risk actors.

Whereas Polygon customers and builders usually are not going through direct threat from this particular marketing campaign, Group-IB mentioned the case is one other reminder that public blockchains might be misused to help off-chain prison exercise in methods which are tough to detect and dismantle.

Share this articleCategoriesTags



Source link

Tags: AbusesblockchainDeadLockPolygonproxyQuietlyransomwareRotateServers
Previous Post

ATOM Price Prediction: Targets $2.75-$2.80 by February 2026

Next Post

Ethereum Treasury Bitmine Makes $200M Bet On MrBeast Firm

Related Posts

Tether freezes $182M in USDT, highlighting centralized control in stablecoins
Scam Alert

Tether freezes $182M in USDT, highlighting centralized control in stablecoins

January 16, 2026
How global sanctions are reshaping illicit crypto activity
Scam Alert

How global sanctions are reshaping illicit crypto activity

January 12, 2026
Truebit protocol hack exposes DeFi security risks as TRU token collapses
Scam Alert

Truebit protocol hack exposes DeFi security risks as TRU token collapses

January 10, 2026
Fake MetaMask 2FA phishing scam uses polished design to steal wallet seed phrases
Scam Alert

Fake MetaMask 2FA phishing scam uses polished design to steal wallet seed phrases

January 6, 2026
SEC filings reveal the multi-million dollar trap hiding inside ‘exclusive’ WhatsApp crypto investment clubs
Scam Alert

SEC filings reveal the multi-million dollar trap hiding inside ‘exclusive’ WhatsApp crypto investment clubs

January 8, 2026
Coinbase claims arrest in the $355 million insider extortion scheme that targeted nearly 70,000 customers
Scam Alert

Coinbase claims arrest in the $355 million insider extortion scheme that targeted nearly 70,000 customers

January 14, 2026
Next Post
Ethereum Treasury Bitmine Makes $200M Bet On MrBeast Firm

Ethereum Treasury Bitmine Makes $200M Bet On MrBeast Firm

US Lawmakers Flag “Pay-to-Play” Fears as SEC Drops 12 Crypto Cases, Pauses Justin Sun Probe

US Lawmakers Flag “Pay-to-Play” Fears as SEC Drops 12 Crypto Cases, Pauses Justin Sun Probe

11 EH/s: Bitmain Eyes a New Bitcoin Mining Proxy? – Miner Weekly

11 EH/s: Bitmain Eyes a New Bitcoin Mining Proxy? – Miner Weekly

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Twitter Instagram LinkedIn Telegram RSS
The Crypto HODL

Find the latest Bitcoin, Ethereum, blockchain, crypto, Business, Fintech News, interviews, and price analysis at The Crypto HODL

CATEGORIES

  • Altcoin
  • Analysis
  • Bitcoin
  • Blockchain
  • Crypto Exchanges
  • Crypto Mining
  • Crypto Updates
  • DeFi
  • Ethereum
  • Metaverse
  • NFT
  • Regulations
  • Scam Alert
  • Uncategorized
  • Videos
  • Web3

SITE MAP

  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2023 The Crypto HODL.
The Crypto HODL is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
Crypto Marketcap

Copyright © 2023 The Crypto HODL.
The Crypto HODL is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In