Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

DeadLock Ransomware Using Polygon Smart Contracts to Evade Detection

CN
Decrypt
Follow
2 months ago
AI summarizes in 5 seconds.

A newly discovered strain of ransomware is using Polygon smart contracts for proxy server address rotation and distribution to infiltrate devices, cybersecurity firm Group‑IB warned on Thursday.


The malware, dubbed DeadLock, was first identified in July 2025 and has so far attracted little attention because it lacks a public affiliate program and a data‑leak site and has infected only a limited number of victims, according to the company.



“Although it’s low profile and yet low impact, it applies innovative methods that showcases an evolving skillset which might become dangerous if organizations do not take this emerging threat seriously,” Group-IB said in a blog.


DeadLock's use of smart contracts to deliver proxy addresses is “an interesting method where attackers can literally apply infinite variants of this technique; imagination is the limit,” the firm noted. Group-IB pointed to a recent report by the Google Threat Intelligence Group highlighting the use of a similar technique called “EtherHiding” employed by North Korean hackers.


What is EtherHiding?


EtherHiding is a campaign disclosed last year in which DPRK hackers used the Ethereum blockchain to conceal and deliver malicious software. Victims are typically lured through compromised websites—often WordPress pages—that load a small snippet of JavaScript. That code then pulls the hidden payload from the blockchain, allowing attackers to distribute malware in a way that is highly resilient to takedowns.


Both EtherHiding and DeadLock repurpose public, decentralized ledgers as covert channels that are difficult for defenders to block or dismantle. DeadLock takes advantage of rotating proxies, which are servers that regularly change the IP of a user, making it harder to track or block.


While Group‑IB admitted that “initial access vectors and other important stages of the attacks remain unknown at this point,” it said DeadLock infections rename encrypted files with a “.dlock” extension and replace desktop backgrounds with ransom notes.


Newer versions also warn victims that sensitive data has been stolen and could be sold or leaked if a ransom is not paid. At least three variants of the malware have been identified so far.


Earlier versions relied on allegedly compromised servers, but researchers now believe the group operates its own infrastructure. The key innovation, however, lies in how DeadLock retrieves and manages server addresses.





“Group-IB researchers uncovered JS code within the HTML file that interacts with a smart contract over the Polygon network,” it explained. “This RPC list contains the available endpoints for interacting with the Polygon network or blockchain, acting as gateways that connect applications to the blockchain’s existing nodes.”


Its most recently observed version also embeds communication channels between the victim and attacker. DeadLock drops a HTML file that acts as a wrapper around the encrypted messaging app Session.


“The main purpose of the HTML file is to facilitate direct communication between the DeadLock operator and the victim,” Group‑IB said.


免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

返20%!Boost新规,参与平分+交易量多赚
广告
|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Selected Articles by Decrypt

11 hours ago
Naoris Launches Post-Quantum Blockchain as Bitcoin, Ethereum Devs Scramble to Face Threat
13 hours ago
Google Researchers Reveal Every Way Hackers Can Trap, Hijack AI Agents
14 hours ago
Elon Musk\\\'s X Is Making Big Changes to Combat Crypto Scams
View More

Table of Contents

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Related Articles

avatar
avatarbitcoin.com
20 minutes ago
Riot Platforms Sells 3,778 Bitcoin in Q1 2026, Raising $289.5 Million for Data Center Expansion
avatar
avatarbitcoin.com
32 minutes ago
Bitcoin Miner Soluna Closes $53 Million Wind Farm Acquisition in West Texas
avatar
avatarcoindesk
40 minutes ago
Naoris Protocol\\\'s quantum-resistant blockchain goes live as Bitcoin and Ethereum face \\\'Q-Day\\\' threats
avatar
avatarbitcoin.com
1 hour ago
Linux Foundation and Coinbase Launch x402 Foundation for AI Agents
avatar
avatarbitcoin.com
1 hour ago
MEXC Integrates USD1 into Full-Spectrum Infrastructure for Global Users
APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink