MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Font ResizerAa
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Reading: DeadLock Ransomware Abuses Polygon Smart Contracts
Share
Font ResizerAa
MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Search
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Have an existing account? Sign In
Follow US
© Market Alert News. All Rights Reserved.
  • bitcoinBitcoin(BTC)$68,717.00-3.53%
  • ethereumEthereum(ETH)$2,063.93-4.66%
  • tetherTether(USDT)$1.00-0.02%
  • binancecoinBNB(BNB)$628.73-2.80%
  • rippleXRP(XRP)$1.36-3.66%
  • usd-coinUSDC(USDC)$1.000.00%
  • solanaSolana(SOL)$86.46-5.69%
  • tronTRON(TRX)$0.310920-0.76%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.02-0.56%
  • dogecoinDogecoin(DOGE)$0.091942-4.14%
Smart Contracts

DeadLock Ransomware Abuses Polygon Smart Contracts

Last updated: January 16, 2026 4:40 am
Published: 2 months ago
Share

Hassan, a Cryptonews.com journalist with 6+ years of experience in Web3 journalism, brings deep knowledge across Crypto, Web3 Gaming, NFTs, and Play-to-Earn sectors. His work has appeared in…

Cybersecurity researchers are becoming interested in a newly discovered ransomware strain called DeadLock that abuses Polygon smart contracts to silently service its infrastructure and bypass conventional detection tools, as a recent report by threat intelligence firm Group-IB depicts.

DeadLock, first observed in July 2025, has so far remained largely under the radar because it does not have a publicly facing affiliate program, it does not have a data leak site, and its victims have been connected to comparatively few confirmed victims.

That profile, however, covers a more technologically sophisticated strategy that researchers believe is showing a more global change in the way cybercriminals are using public blockchains for criminal ends.

How DeadLock Hides Ransomware Infrastructure Inside Polygon Smart Contracts

Group-IB’s analysis shows that DeadLock uses smart contracts deployed on the Polygon network to store and rotate proxy server addresses.

These proxies act as intermediaries between infected systems and the ransomware operators, allowing command-and-control traffic to shift endpoints without relying on centralized infrastructure that can be seized or blocked.

By querying the smart contract, the malware retrieves the current proxy address through a simple read operation that leaves no obvious transactional footprint and incurs no network cost.

Researchers said this technique mirrors earlier campaigns, such as EtherHiding, disclosed last year, in which North Korean threat actors used the Ethereum blockchain to conceal and distribute malware payloads.

In both cases, public and decentralized ledgers were turned into resilient communication channels that are difficult for defenders to disrupt. DeadLock’s use of Polygon extends that concept by embedding proxy management directly into a smart contract, allowing attackers to update infrastructure on demand.

Once deployed, DeadLock encrypts files and appends a “.dlock” extension, alters system icons, and replaces the victim’s wallpaper with ransom instructions.

Over time, the group’s ransom notes have evolved, with early samples referencing only file encryption, while later versions explicitly stated that sensitive data had been stolen and threatened its sale if payment was not made.

The most recent ransom notes also promise “added services,” including a breakdown of how the network was breached and assurances that the victim will not be targeted again.

This Ransomware Doesn’t Just Lock Files — It Opens a Chat With Hackers

Group-IB identified at least three distinct DeadLock samples from mid-2025, each showing incremental changes in tactics.

Analysis of associated PowerShell scripts suggests the malware aggressively disables non-essential services, deletes volume shadow copies to prevent recovery, and whitelists a limited set of processes, notably including AnyDesk

Investigators believe AnyDesk is used as the primary remote access tool during attacks, a finding consistent with separate digital forensics investigations.

A key element of DeadLock’s operation is an HTML file dropped on infected systems that embeds an encrypted session messenger interface. Victims can communicate directly with attackers through this file without installing additional software.

The embedded JavaScript retrieves proxy addresses from the Polygon smart contract, then routes encrypted messages through those servers to a session ID controlled by the ransomware operators.

Transaction analysis shows that the same wallet created multiple identical smart contracts and repeatedly updated proxy addresses by calling a function labeled “setProxy.”

The wallet was funded through an exchange-linked address shortly before the contracts were deployed, indicating deliberate preparation.

Historical tracking of these transactions allows defenders to reconstruct past proxy infrastructure, although the decentralized design complicates rapid takedown efforts.

The finding is part of an overall increase in crypto-related cybercrime, as over $3.4 billion was stolen by hacks and exploits as of early December 2025, with state-linked North Korean groups accounting for over $2 billion of that total.

Read more on cryptonews.com

This news is powered by cryptonews.com cryptonews.com

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Like this:

Like Loading...

Related

XRPChain Kicks Off Its Presale with Up to 200x Potential and Massive USDT Referral Instant Payouts
Ethereum & Cardano Heat Up as BlockDAG’s $433M+ Presale & Coinbase-Kraken Leak Sends the Market Into a Frenzy
ERG S.p.A.: How an Italian Wind Power Pure Play Is Turning Utilities Into a Scalable Product
Is Solana The New ETH? Yearly Highs Have Unlocked $10k Targets, Utility Token Classed As A Game Changer Nears Launch – Crypto Economy
Zero Knowledge Proof’s 200M Token Presale Auction Pushes Investors to Move Quickly Before Early Access Ends – Tekedia

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
Previous Article DeadLock Ransomware Uses Polygon Smart Contracts for Evasion – Crypto Economy
Next Article OFAC Crypto Sanctions Hit $100B+ in Illicit Flows Through 2025
© Market Alert News. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Prove your humanity


Lost your password?

%d