Close Menu

    Subscribe to Updates

    What's Hot

    Devcon updates: Announcing Wave 2, a New Application window, and more!

    January 16, 2026

    Ransomware group uses Polygon to evade takedowns

    January 16, 2026

    Devcon Tickets: Wave 3 and beyond

    January 16, 2026
    Facebook X (Twitter) Instagram
    laicryptolaicrypto
    Demo
    • Ethereum
    • Crypto
    • Altcoins
    • Blockchain
    • Bitcoin
    • Lithosphere News Releases
    laicryptolaicrypto
    Home Ransomware group uses Polygon to evade takedowns
    Crypto

    Ransomware group uses Polygon to evade takedowns

    John SmithBy John SmithJanuary 16, 2026No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Security researchers say a low-profile ransomware group is using Polygon smart contracts to hide and rotate its command-and-control infrastructure.

    Summary

    • DeadLock ransomware, first observed in July 2025, stores rotating proxy addresses inside Polygon smart contracts to evade takedowns.
    • The technique relies only on reading on-chain data and does not exploit vulnerabilities in Polygon or other smart contracts.
    • Researchers warn the method is cheap, decentralized, and difficult to block, even though the campaign has limited confirmed victims so far.

    Cybersecurity researchers are warning that a recently identified ransomware strain is using Polygon smart contracts in an unusual way that could make its infrastructure harder to disrupt.

    In a report published on Jan. 15, researchers at cybersecurity firm Group-IB said the ransomware, known as DeadLock, is abusing publicly readable smart contracts on the Polygon (POL) network to store and rotate proxy server addresses used to communicate with infected victims.

    DeadLock was first observed in July 2025 and has remained relatively low profile since then. Group-IB said the operation has a limited number of confirmed victims and is not linked to any known ransomware affiliate programs or public data leak sites.

    Despite its low visibility, the firm warned that the techniques being used are highly inventive and could pose serious risks if copied by more established groups.

    How the technique works

    Instead of relying on traditional command-and-control servers, which can often be blocked or taken offline, DeadLock embeds code that queries a specific Polygon smart contract after a system has been infected and encrypted. That contract stores the current proxy address used to relay communication between the attackers and the victim.

    Because the data is stored on-chain, attackers can update the proxy address at any time, allowing them to rotate infrastructure quickly without redeploying malware. Victims do not need to send transactions or pay gas fees, as the ransomware only performs read operations on the blockchain.

    Once contact is established, victims receive ransom demands along with threats that stolen data will be sold if payment is not made. Group-IB noted that this approach makes the ransomware’s infrastructure far more resilient.

    There is no central server to shut down, and the contract data remains available across distributed nodes worldwide, making takedowns significantly more difficult.

    No Polygon vulnerability involved

    The researchers stressed that DeadLock is not exploiting flaws in Polygon itself or in third-party smart contracts such as decentralized finance protocols, wallets, or bridges. The ransomware is simply abusing the public and immutable nature of blockchain data to hide configuration information, a method similar to earlier “EtherHiding” techniques.

    Several smart contracts linked to the campaign were deployed or updated between August and Nov. 2025, according to Group-IB’s analysis. While the activity remains limited for now, the firm warned that the concept could be reused in countless variations by other threat actors.

    While Polygon users and developers are not facing direct risk from the campaign, researchers say the case highlights how public blockchains can be misused to support off-chain criminal activity in ways that are difficult to detect and dismantle.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    John Smith

    Related Posts

    State Street introduces a new digital-asset platform

    January 16, 2026

    Dems slam SEC over crypto ‘pay-to-play’ concerns

    January 16, 2026

    Zcash slides despite SEC clearing it of enforcement risk

    January 15, 2026
    Leave A Reply Cancel Reply

    Demo
    Don't Miss
    Ethereum

    Devcon updates: Announcing Wave 2, a New Application window, and more!

    By Michael JohnsonJanuary 16, 20260

    各位, With well under three months to go until Devcon, we are moving at full…

    Ransomware group uses Polygon to evade takedowns

    January 16, 2026

    Devcon Tickets: Wave 3 and beyond

    January 16, 2026

    State Street introduces a new digital-asset platform

    January 16, 2026

    LAI Crypto is a user-friendly platform that empowers individuals to navigate the world of cryptocurrency trading and investment with ease and confidence.

    Our Posts
    • Altcoins (54)
    • Blockchain (45)
    • Crypto (722)
    • Ethereum (372)
    • Lithosphere News Releases (10)

    Subscribe to Updates

    • Twitter
    • Instagram
    • YouTube
    • LinkedIn

    Type above and press Enter to search. Press Esc to cancel.