The post DeadLock ransomware abuses Polygon blockchain to rotate proxy servers quietly appeared on BitcoinEthereumNews.com. Group-IB published its report on JanThe post DeadLock ransomware abuses Polygon blockchain to rotate proxy servers quietly appeared on BitcoinEthereumNews.com. Group-IB published its report on Jan

DeadLock ransomware abuses Polygon blockchain to rotate proxy servers quietly

  • Group-IB published its report on Jan. 15 and said the method could make disruption harder for defenders.
  • The malware reads on-chain data, so victims do not pay gas fees.
  • Researchers said Polygon is not vulnerable, but the tactic could spread.

Ransomware groups usually rely on command-and-control servers to manage communications after breaking into a system.

But security researchers now say a low-profile strain is using blockchain infrastructure in a way that could be harder to block.

In a report published on Jan. 15, cybersecurity firm Group-IB said a ransomware operation known as DeadLock is abusing Polygon (POL) smart contracts to store and rotate proxy server addresses.

These proxy servers are used to relay communication between attackers and victims after systems are infected.

Because the information sits on-chain and can be updated anytime, researchers warned that this approach could make the group’s backend more resilient and tougher to disrupt.

Smart contracts used to store proxy information

Group-IB said DeadLock does not depend on the usual setup of fixed command-and-control servers.

Instead, once a machine is compromised and encrypted, the ransomware queries a specific smart contract deployed on the Polygon network.

That contract stores the latest proxy address that DeadLock uses to communicate. The proxy acts as a middle layer, helping attackers maintain contact without exposing their main infrastructure directly.

Since the smart contract data is publicly readable, the malware can retrieve the details without sending any blockchain transactions.

This also means victims do not need to pay gas fees or interact with wallets.

DeadLock only reads the information, treating the blockchain as a persistent source of configuration data.

Rotating infrastructure without malware updates

One reason this method stands out is how quickly attackers can change their communication routes.

Group-IB said the actors behind DeadLock can update the proxy address stored inside the contract whenever necessary.

That gives them the ability to rotate infrastructure without modifying the ransomware itself or pushing new versions into the wild.

In traditional ransomware cases, defenders can sometimes block traffic by identifying known command-and-control servers.

But with an on-chain proxy list, any proxy that gets flagged can be replaced simply by updating the contract’s stored value.

Once contact is established through the updated proxy, victims receive ransom demands along with threats that stolen information will be sold if payment is not made.

Why takedowns become more difficult

Group-IB warned that using blockchain data this way makes disruption significantly harder.

There is no single central server that can be seized, removed, or shut down.

Even if a specific proxy address is blocked, the attackers can switch to another one without having to redeploy the malware.

Since the smart contract remains accessible through Polygon’s distributed nodes worldwide, the configuration data can continue to exist even if the infrastructure on the attackers’ side changes.

Researchers said this gives ransomware operators a more resilient command-and-control mechanism compared with conventional hosting setups.

A small campaign with an inventive method

DeadLock was first observed in July 2025 and has stayed relatively low profile so far.

Group-IB said the operation has only a limited number of confirmed victims.

The report also noted that DeadLock is not linked to known ransomware affiliate programmes and does not appear to operate a public data leak site.

While that may explain why the group has received less attention than major ransomware brands, researchers said its technical approach deserves close monitoring.

Group-IB warned that even if DeadLock remains small, its technique could be copied by more established cybercriminal groups.

No Polygon vulnerability involved

The researchers stressed that DeadLock is not exploiting any vulnerability in Polygon itself.

It is also not attacking third-party smart contracts such as decentralised finance protocols, wallets, or bridges.

Instead, the attackers are abusing the public and immutable nature of blockchain data to hide configuration information.

Group-IB compared the technique to earlier “EtherHiding” approaches, where criminals used blockchain networks to distribute malicious configuration data.

Several smart contracts connected to the campaign were deployed or updated between August and Nov. 2025, according to the firm’s analysis.

Researchers said the activity remains limited for now, but the concept could be reused in many different forms by other threat actors.

While Polygon users and developers are not facing direct risk from this specific campaign, Group-IB said the case is another reminder that public blockchains can be misused to support off-chain criminal activity in ways that are difficult to detect and dismantle.

Source: https://coinjournal.net/news/deadlock-ransomware-abuses-polygon-blockchain-to-rotate-proxy-servers-quietly/

Market Opportunity
Notcoin Logo
Notcoin Price(NOT)
$0.0006353
$0.0006353$0.0006353
+0.49%
USD
Notcoin (NOT) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

A Radical Neural Network Approach to Modeling Shock Dynamics

A Radical Neural Network Approach to Modeling Shock Dynamics

This paper introduces a non-diffusive neural network (NDNN) method for solving hyperbolic conservation laws, designed to overcome the shortcomings of standard Physics-Informed Neural Networks (PINNs) in modeling shock waves. The NDNN framework decomposes the solution domain into smooth subdomains separated by discontinuity lines, identified via Rankine-Hugoniot conditions. This approach enables accurate tracking of entropic shocks, shock generation, and wave interactions, while reducing the diffusive errors typical in PINNs. Numerical experiments validate the algorithm’s potential, highlighting its promise for extending shock-wave computations to higher-dimensional problems.
Share
Hackernoon2025/09/19 18:38
A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release

A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release

The post A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release appeared on BitcoinEthereumNews.com. KPop Demon Hunters Netflix Everyone has wondered what may be the next step for KPop Demon Hunters as an IP, given its record-breaking success on Netflix. Now, the answer may be something exactly no one predicted. According to a new filing with the MPA, something called Debut: A KPop Demon Hunters Story has been rated PG by the ratings body. It’s listed alongside some other films, and this is obviously something that has not been publicly announced. A short film could be well, very short, a few minutes, and likely no more than ten. Even that might be pushing it. Using say, Pixar shorts as a reference, most are between 4 and 8 minutes. The original movie is an hour and 36 minutes. The “Debut” in the title indicates some sort of flashback, perhaps to when HUNTR/X first arrived on the scene before they blew up. Previously, director Maggie Kang has commented about how there were more backstory components that were supposed to be in the film that were cut, but hinted those could be explored in a sequel. But perhaps some may be put into a short here. I very much doubt those scenes were fully produced and simply cut, but perhaps they were finished up for this short film here. When would Debut: KPop Demon Hunters theoretically arrive? I’m not sure the other films on the list are much help. Dead of Winter is out in less than two weeks. Mother Mary does not have a release date. Ne Zha 2 came out earlier this year. I’ve only seen news stories saying The Perfect Gamble was supposed to come out in Q1 2025, but I’ve seen no evidence that it actually has. KPop Demon Hunters Netflix It could be sooner rather than later as Netflix looks to capitalize…
Share
BitcoinEthereumNews2025/09/18 02:23
Headwind Helps Best Wallet Token

Headwind Helps Best Wallet Token

The post Headwind Helps Best Wallet Token appeared on BitcoinEthereumNews.com. Google has announced the launch of a new open-source protocol called Agent Payments Protocol (AP2) in partnership with Coinbase, the Ethereum Foundation, and 60 other organizations. This allows AI agents to make payments on behalf of users using various methods such as real-time bank transfers, credit and debit cards, and, most importantly, stablecoins. Let’s explore in detail what this could mean for the broader cryptocurrency markets, and also highlight a presale crypto (Best Wallet Token) that could explode as a result of this development. Google’s Push for Stablecoins Agent Payments Protocol (AP2) uses digital contracts known as ‘Intent Mandates’ and ‘Verifiable Credentials’ to ensure that AI agents undertake only those payments authorized by the user. Mandates, by the way, are cryptographically signed, tamper-proof digital contracts that act as verifiable proof of a user’s instruction. For example, let’s say you instruct an AI agent to never spend more than $200 in a single transaction. This instruction is written into an Intent Mandate, which serves as a digital contract. Now, whenever the AI agent tries to make a payment, it must present this mandate as proof of authorization, which will then be verified via the AP2 protocol. Alongside this, Google has also launched the A2A x402 extension to accelerate support for the Web3 ecosystem. This production-ready solution enables agent-based crypto payments and will help reshape the growth of cryptocurrency integration within the AP2 protocol. Google’s inclusion of stablecoins in AP2 is a massive vote of confidence in dollar-pegged cryptocurrencies and a huge step toward making them a mainstream payment option. This widens stablecoin usage beyond trading and speculation, positioning them at the center of the consumption economy. The recent enactment of the GENIUS Act in the U.S. gives stablecoins more structure and legal support. Imagine paying for things like data crawls, per-task…
Share
BitcoinEthereumNews2025/09/18 01:27