Close Menu
    What's Hot

    PInvestigators Say Stolen Louvre Jewels Were Hidden in Parking Lot

    Ethereum Activity Retention Doubles With Record Transactions

    DeadLock Malware Exploits Polygon Smart Contracts to Hide

    Facebook X (Twitter) Instagram
    Friday, January 16
    • About us
    • Contact us
    • Privacy Policy
    • Contact
    Facebook X (Twitter) Instagram
    kryptodaily.com
    • Home
    • Crypto News
      • Altcoin
      • Ethereum
      • NFT
    • Learn Crypto
      • Bitcoin
      • Blockchain
    • Live Chart
    • About Us
    • Contact
    kryptodaily.com
    Home»NFT»DeadLock Malware Exploits Polygon Smart Contracts to Hide
    NFT

    DeadLock Malware Exploits Polygon Smart Contracts to Hide

    KryptonewsBy KryptonewsJanuary 16, 2026No Comments2 Mins Read
    Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
    Follow Us
    Google News Flipboard
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    A recently-discovered ransomware dubbed “DeadLock” is stealthily exploiting Polygon smart contracts to rotate and distribute proxy addresses, say researchers at cybersecurity firm Group-IB.

    The company reported on Thursday that the DeadLock ransomware, first discovered in July, has seen “low exposure” as it isn’t tied to any known data leak site or affiliate programs and has a “limited number of reported victims.”

    However, Group-IB warned that even though the ransomware is “low profile,” it uses “innovative methods” that could be dangerous to organizations that don’t take the malware seriously, “especially since the abuse of this specific blockchain for malicious purposes has not been widely reported.”

    DeadLock leverages Polygon smart contracts to store and rotate proxy server addresses used to communicate with victims. Code embedded in the ransomware interacts with a specific smart contract address and uses a function to dynamically update command-and-control infrastructure.

    Once victims have been infected with the malware and encryption has occurred, DeadLock threatens them with a ransom note and the selling of stolen data if their demands are not met.

    Infinite variants of the technique can be applied

    By storing proxy addresses on-chain, Group-IB said DeadLock creates infrastructure that is extremely difficult to disrupt, as there is no central server to take down, and blockchain data persists indefinitely across distributed nodes worldwide.

    Related: Hackers find new way to hide malware in Ethereum smart contracts

    “This exploit of smart contracts to deliver proxy addresses is an interesting method where attackers can literally apply infinite variants of this technique; imagination is the limit,” it added.

    HTML file with an embedded Session private messenger to contact the threat actor. Source: Group-IB

    North Korean threat actors found “EtherHiding” 

    Weaponizing smart contracts for malware dissemination is not new, with Group-IB noting a tactic called “EtherHiding” that Google reported in October.