In short
- Cybersecurity agency Group-IB has warned that ransomware household DeadLock is utilizing Polygon good contracts to distribute and rotate proxy server addresses, serving to it evade detection.
- The ransomware has stayed below the radar attributable to few victims, no associates program, and no public information leak web site.
- The approach mirrors Google’s disclosures final yr regarding “EtherHiding,” which abuses Ethereum good contracts to hide malware.
A newly found pressure of ransomware is utilizing Polygon good contracts for proxy server handle rotation and distribution to infiltrate units, cybersecurity agency Group‑IB warned on Thursday.
The malware, dubbed DeadLock, was first recognized in July 2025 and has to this point attracted little consideration as a result of it lacks a public associates program and a knowledge‑leak web site and has contaminated solely a restricted variety of victims, in response to the corporate.
🚨 DeadLock Ransomware: When Blockchain Meets Cybercrime
Group-IB has uncovered a complicated new menace rewriting the ransomware playbook. DeadLock leverages Polygon good contracts to rotate proxy addresses, a stealthy, under-reported approach that bypasses conventional… pic.twitter.com/rlPu9gZd5F
— Group-IB International (@GroupIB) January 15, 2026
“Though it’s low profile and but low impression, it applies modern strategies that showcases an evolving skillset which could turn out to be harmful if organizations don’t take this rising menace critically,” Group-IB mentioned in a weblog.
DeadLock’s use of good contracts to ship proxy addresses is “an attention-grabbing technique the place attackers can actually apply infinite variants of this method; creativeness is the restrict,” the agency famous. Group-IB pointed to a current report by the Google Risk Intelligence Group highlighting using the same approach referred to as “EtherHiding” employed by North Korean hackers.
What’s EtherHiding?
EtherHiding is a marketing campaign disclosed final yr through which DPRK hackers used the Ethereum blockchain to hide and ship malicious software program. Victims are usually lured by means of compromised web sites—typically WordPress pages—that load a small snippet of JavaScript. That code then pulls the hidden payload from the blockchain, permitting attackers to distribute malware in a method that’s extremely resilient to takedowns.
Each EtherHiding and DeadLock repurpose public, decentralized ledgers as covert channels which are tough for defenders to dam or dismantle. DeadLock takes benefit of rotating proxies, that are servers that recurrently change the IP of a person, making it more durable to trace or block.
Whereas Group‑IB admitted that “preliminary entry vectors and different vital levels of the assaults stay unknown at this level,” it mentioned DeadLock infections rename encrypted recordsdata with a “.dlock” extension and exchange desktop backgrounds with ransom notes.
Newer variations additionally warn victims that delicate information has been stolen and could possibly be bought or leaked if a ransom isn’t paid. A minimum of three variants of the malware have been recognized to this point.
Earlier variations relied on allegedly compromised servers, however researchers now imagine the group operates its personal infrastructure. The important thing innovation, nonetheless, lies in how DeadLock retrieves and manages server addresses.
“Group-IB researchers uncovered JS code throughout the HTML file that interacts with a wise contract over the Polygon community,” it defined. “This RPC checklist comprises the accessible endpoints for interacting with the Polygon community or blockchain, appearing as gateways that join functions to the blockchain’s current nodes.”
Its most just lately noticed model additionally embeds communication channels between the sufferer and attacker. DeadLock drops a HTML file that acts as a wrapper across the encrypted messaging app Session.
“The principle objective of the HTML file is to facilitate direct communication between the DeadLock operator and the sufferer,” Group‑IB mentioned.
Each day Debrief E-newsletter
Begin on daily basis with the highest information tales proper now, plus authentic options, a podcast, movies and extra.

