DeadLock Ransomware Exploits Polygon Smart Contracts to Evade Detection

Markets 2026-01-16 00:11

DeadLock Ransomware Exploits Polygon Smart Contracts to Evade Detection

A newly discovered ransomware strain is weaponizing blockchain technology to build resilient command-and-control infrastructure that security teams struggle to dismantle.

Group-IB cybersecurity researchers disclosed Thursday that DeadLock ransomware, first identified in July 2025, stores proxy server addresses inside Polygon smart contracts.

The technique allows operators to continuously rotate connection points between victims and attackers, making traditional blocking methods ineffective.

DeadLock has maintained an unusually low profile despite its technical sophistication - operating without an affiliate program or public data leak site.

What Makes DeadLock Different

Unlike typical ransomware gangs that publicly shame victims, DeadLock threatens to sell stolen data through underground markets.

The malware embeds JavaScript code within HTML files that communicate with smart contracts on the Polygon network.

These contracts function as decentralized repositories for proxy addresses, which the malware retrieves through read-only blockchain calls that generate no transaction fees.

Researchers identified at least three DeadLock variants, with newer versions incorporating Session encrypted messaging for direct victim communication.

Read also: CME Group Adds Cardano, Chainlink And Stellar Futures To Crypto Derivatives Suite

Why Blockchain-Based Attacks Matter

The approach mirrors "EtherHiding," a technique Google's Threat Intelligence Group documented in October 2025 after observing North Korean state actors using similar methods.

"This exploit of smart contracts to deliver proxy addresses is an interesting method where attackers can literally apply infinite variants of this technique," Group-IB analyst Xabier Eizaguirre noted.

Blockchain-stored infrastructure proves difficult to eliminate because decentralized ledgers cannot be seized or taken offline like traditional servers.

DeadLock infections rename files with a ".dlock" extension and deploy PowerShell scripts to disable Windows services and delete shadow copies.

Earlier attacks reportedly exploited vulnerabilities in Baidu Antivirus and used bring-your-own-vulnerable-driver techniques to terminate endpoint detection processes.

Group-IB acknowledges gaps remain in understanding DeadLock's initial access methods and full attack chain, though researchers confirmed the group recently reactivated operations with new proxy infrastructure.

The technique's adoption by both nation-state actors and financially motivated cybercriminals signals a concerning evolution in how adversaries leverage blockchain's resilience for malicious purposes.

Read also: Solana ETF Inflows Hit $23.6M Four-Week Peak As Network Metrics Show Decline

Share to:

This content is for informational purposes only and does not constitute investment advice.

Curated Series

SuperEx Popular Science Articles Column

SuperEx Popular Science Articles Column

This collection features informative articles about SuperEx, aiming to simplify complex cryptocurrency concepts for a wider audience. It covers the basics of trading, blockchain technology, and the features of the SuperEx platform. Through easy-to-understand content, it helps users navigate the world of digital assets with confidence and clarity.

Unstaked related news and market dynamics research

Unstaked related news and market dynamics research

Unstaked (UNSD) is a blockchain platform integrating AI agents for automated community engagement and social media interactions. Its native token supports governance, staking, and ecosystem features. This special feature explores Unstaked’s market updates, token dynamics, and platform development.

XRP News and Research

XRP News and Research

This series focuses on XRP, covering the latest news, market dynamics, and in-depth research. Featured analysis includes price trends, regulatory developments, and ecosystem growth, providing a clear overview of XRP's position and potential in the cryptocurrency market.

How do beginners trade options?How does option trading work?

How do beginners trade options?How does option trading work?

This special feature introduces the fundamentals of options trading for beginners, explaining how options work, their main types, and the mechanics behind trading them. It also explores key strategies, potential risks, and practical tips, helping readers build a clear foundation to approach the options market with confidence.

What are the risks of investing in cryptocurrency?

What are the risks of investing in cryptocurrency?

This special feature covers the risks of investing in cryptocurrency, explaining common challenges such as market volatility, security vulnerabilities, regulatory uncertainties, and potential scams. It also provides analysis of risk management strategies and mitigation techniques, helping readers gain a clear understanding of how to navigate the crypto market safely.