Cybersecurity researchers are becoming interested in a newly discovered ransomware strain called DeadLock that abuses Polygon smart contracts to silently serviceCybersecurity researchers are becoming interested in a newly discovered ransomware strain called DeadLock that abuses Polygon smart contracts to silently service

Beware: New ‘DeadLock’ Ransomware Weaponizes Polygon Smart Contracts to Stay Invisible

Cybersecurity researchers are becoming interested in a newly discovered ransomware strain called DeadLock that abuses Polygon smart contracts to silently service its infrastructure and bypass conventional detection tools, as a recent report by threat intelligence firm Group-IB depicts.

DeadLock, first observed in July 2025, has so far remained largely under the radar because it does not have a publicly facing affiliate program, it does not have a data leak site, and its victims have been connected to comparatively few confirmed victims.

That profile, however, covers a more technologically sophisticated strategy that researchers believe is showing a more global change in the way cybercriminals are using public blockchains for criminal ends.

How DeadLock Hides Ransomware Infrastructure Inside Polygon Smart Contracts

Group-IB’s analysis shows that DeadLock uses smart contracts deployed on the Polygon network to store and rotate proxy server addresses.

These proxies act as intermediaries between infected systems and the ransomware operators, allowing command-and-control traffic to shift endpoints without relying on centralized infrastructure that can be seized or blocked.

By querying the smart contract, the malware retrieves the current proxy address through a simple read operation that leaves no obvious transactional footprint and incurs no network cost.

Researchers said this technique mirrors earlier campaigns, such as EtherHiding, disclosed last year, in which North Korean threat actors used the Ethereum blockchain to conceal and distribute malware payloads.

In both cases, public and decentralized ledgers were turned into resilient communication channels that are difficult for defenders to disrupt. DeadLock’s use of Polygon extends that concept by embedding proxy management directly into a smart contract, allowing attackers to update infrastructure on demand.

Source: Group-IB

Once deployed, DeadLock encrypts files and appends a “.dlock” extension, alters system icons, and replaces the victim’s wallpaper with ransom instructions.

Over time, the group’s ransom notes have evolved, with early samples referencing only file encryption, while later versions explicitly stated that sensitive data had been stolen and threatened its sale if payment was not made.

The most recent ransom notes also promise “added services,” including a breakdown of how the network was breached and assurances that the victim will not be targeted again.

This Ransomware Doesn’t Just Lock Files — It Opens a Chat With Hackers

Group-IB identified at least three distinct DeadLock samples from mid-2025, each showing incremental changes in tactics.

Analysis of associated PowerShell scripts suggests the malware aggressively disables non-essential services, deletes volume shadow copies to prevent recovery, and whitelists a limited set of processes, notably including AnyDesk

Investigators believe AnyDesk is used as the primary remote access tool during attacks, a finding consistent with separate digital forensics investigations.

A key element of DeadLock’s operation is an HTML file dropped on infected systems that embeds an encrypted session messenger interface. Victims can communicate directly with attackers through this file without installing additional software.

Source: Group-IB

The embedded JavaScript retrieves proxy addresses from the Polygon smart contract, then routes encrypted messages through those servers to a session ID controlled by the ransomware operators.

Transaction analysis shows that the same wallet created multiple identical smart contracts and repeatedly updated proxy addresses by calling a function labeled “setProxy.”

The wallet was funded through an exchange-linked address shortly before the contracts were deployed, indicating deliberate preparation.

Historical tracking of these transactions allows defenders to reconstruct past proxy infrastructure, although the decentralized design complicates rapid takedown efforts.

The finding is part of an overall increase in crypto-related cybercrime, as over $3.4 billion was stolen by hacks and exploits as of early December 2025, with state-linked North Korean groups accounting for over $2 billion of that total.

Market Opportunity
Smart Blockchain Logo
Smart Blockchain Price(SMART)
$0.004999
$0.004999$0.004999
-1.28%
USD
Smart Blockchain (SMART) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Gold continues to hit new highs. How to invest in gold in the crypto market?

Gold continues to hit new highs. How to invest in gold in the crypto market?

As Bitcoin encounters a "value winter", real-world gold is recasting the iron curtain of value on the blockchain.
Share
PANews2025/04/14 17:12
DOGE ETF News & Could Layer Brett See an ETF Approval in Years to come?

DOGE ETF News & Could Layer Brett See an ETF Approval in Years to come?

The post DOGE ETF News & Could Layer Brett See an ETF Approval in Years to come? appeared on BitcoinEthereumNews.com. Crypto News 20 September 2025 | 01:10 The latest Dogecoin updates have traders buzzing as DOGE continues to hold its ground above key support levels. With rumors swirling about the possibility of a DOGE ETF in the future, excitement is building around what could be a major milestone for the original meme coin. If approved, analysts believe a DOGE ETF could send prices surging, potentially revisiting previous highs or even setting new ones. But the conversation doesn’t end there — investors are also asking if future ETF approvals could one day include rising stars like Layer Brett ($LBRETT). Dogecoin price prediction: ETF speculation builds Dogecoin has long been one of the most community-driven cryptos, and an ETF would represent institutional validation for the meme coin sector. Current Dogecoin price prediction models show moderate gains in the short term, with analysts targeting 20–30% upside if sentiment remains strong. Some market commentators suggest that a DOGE ETF could bring a wave of institutional money into the space, pushing liquidity and trading volumes to levels not seen since 2021. That said, DOGE’s massive market cap means it is unlikely to see the type of explosive multiples that newer projects can still achieve. This is why some traders are splitting their bets — holding DOGE for stability while hunting for higher risk–reward plays elsewhere. Could Layer Brett be the next meme coin ETF candidate? Layer Brett is quickly becoming the name on everyone’s lips in the meme coin sector. Built on Ethereum Layer 2, $LBRETT combines viral meme energy with real blockchain utility, offering lightning-fast transactions and low fees. While an ETF for $LBRETT is still a distant conversation, analysts believe its growing community, capped 10B supply, and staking mechanics make it a strong candidate for mainstream adoption in the coming years. If meme…
Share
BitcoinEthereumNews2025/09/20 07:01
Zero Knowledge Proof (ZKP) vs DOGE, SHIB, and PEPE: Good Crypto to Buy Now for Structure-Driven Gains

Zero Knowledge Proof (ZKP) vs DOGE, SHIB, and PEPE: Good Crypto to Buy Now for Structure-Driven Gains

In crypto, most gains don’t come when a chart is trending; they come before it. Real returns are usually locked in through smart entry, not loud exit points. That
Share
LiveBitcoinNews2026/01/16 08:00