App Store
Wallet

DeadLock Ransomware Exploits Polygon Smart Contracts to Evade Detection

DeadLock Ransomware Exploits Polygon Smart Contracts to Evade Detection

A newly discovered ransomware strain is weaponizing blockchain technology to build resilient command-and-control infrastructure that security teams struggle to dismantle.

Group-IB cybersecurity researchers disclosed Thursday that DeadLock ransomware, first identified in July 2025, stores proxy server addresses inside Polygon smart contracts.

The technique allows operators to continuously rotate connection points between victims and attackers, making traditional blocking methods ineffective.

DeadLock has maintained an unusually low profile despite its technical sophistication - operating without an affiliate program or public data leak site.

What Makes DeadLock Different

Unlike typical ransomware gangs that publicly shame victims, DeadLock threatens to sell stolen data through underground markets.

The malware embeds JavaScript code within HTML files that communicate with smart contracts on the Polygon network.

These contracts function as decentralized repositories for proxy addresses, which the malware retrieves through read-only blockchain calls that generate no transaction fees.

Researchers identified at least three DeadLock variants, with newer versions incorporating Session encrypted messaging for direct victim communication.

Read also: CME Group Adds Cardano, Chainlink And Stellar Futures To Crypto Derivatives Suite

Why Blockchain-Based Attacks Matter

The approach mirrors "EtherHiding," a technique Google's Threat Intelligence Group documented in October 2025 after observing North Korean state actors using similar methods.

"This exploit of smart contracts to deliver proxy addresses is an interesting method where attackers can literally apply infinite variants of this technique," Group-IB analyst Xabier Eizaguirre noted.

Blockchain-stored infrastructure proves difficult to eliminate because decentralized ledgers cannot be seized or taken offline like traditional servers.

DeadLock infections rename files with a ".dlock" extension and deploy PowerShell scripts to disable Windows services and delete shadow copies.

Earlier attacks reportedly exploited vulnerabilities in Baidu Antivirus and used bring-your-own-vulnerable-driver techniques to terminate endpoint detection processes.

Group-IB acknowledges gaps remain in understanding DeadLock's initial access methods and full attack chain, though researchers confirmed the group recently reactivated operations with new proxy infrastructure.

The technique's adoption by both nation-state actors and financially motivated cybercriminals signals a concerning evolution in how adversaries leverage blockchain's resilience for malicious purposes.

Read also: Solana ETF Inflows Hit $23.6M Four-Week Peak As Network Metrics Show Decline

Disclaimer and Risk Warning: The information provided in this article is for educational and informational purposes only and is based on the author's opinion. It does not constitute financial, investment, legal, or tax advice. Cryptocurrency assets are highly volatile and subject to high risk, including the risk of losing all or a substantial amount of your investment. Trading or holding crypto assets may not be suitable for all investors. The views expressed in this article are solely those of the author(s) and do not represent the official policy or position of Yellow, its founders, or its executives. Always conduct your own thorough research (D.Y.O.R.) and consult a licensed financial professional before making any investment decision.
Latest News
Show All News