{"id":88830,"date":"2026-01-16T09:19:54","date_gmt":"2026-01-16T09:19:54","guid":{"rendered":"https:\/\/freakcryptos.com\/index.php\/2026\/01\/16\/deadlock-ransomware-abuses-polygon-blockchain-to-rotate-proxy-servers-quietly\/"},"modified":"2026-01-16T09:19:55","modified_gmt":"2026-01-16T09:19:55","slug":"deadlock-ransomware-abuses-polygon-blockchain-to-rotate-proxy-servers-quietly","status":"publish","type":"post","link":"https:\/\/freakcryptos.com\/index.php\/2026\/01\/16\/deadlock-ransomware-abuses-polygon-blockchain-to-rotate-proxy-servers-quietly\/","title":{"rendered":"DeadLock ransomware abuses Polygon blockchain to rotate proxy servers quietly"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div xmlns:default=\"http:\/\/www.w3.org\/2000\/svg\" data-site=\"CoinJournal\">\n<div class=\"-mt-16  mb-8  lg:-mt-20  rounded-md  shadow-md\">\n<div class=\"relative  z-10  post-article-image  rounded  overflow-hidden\" data-site=\"CoinJournal\">\n<picture><source srcset=\"https:\/\/coinjournal.net\/wp-content\/uploads\/imagecache\/2026\/01\/20260116_1234_Image-Generation_simple_compose_01kf2sx0kfe8rbaznmd32940ph-1-smartcrop-750x375.webp\" type=\"image\/webp\" media=\"(min-width: 750px)\"\/><source srcset=\"https:\/\/coinjournal.net\/wp-content\/uploads\/imagecache\/2026\/01\/20260116_1234_Image-Generation_simple_compose_01kf2sx0kfe8rbaznmd32940ph-1-smartcrop-363x181.webp\" type=\"image\/webp\"\/><source srcset=\"https:\/\/coinjournal.net\/wp-content\/uploads\/imagecache\/2026\/01\/20260116_1234_Image-Generation_simple_compose_01kf2sx0kfe8rbaznmd32940ph-1-smartcrop-750x375.png\" type=\"image\/jpeg\" media=\"(min-width: 750px)\"\/><source srcset=\"https:\/\/coinjournal.net\/wp-content\/uploads\/imagecache\/2026\/01\/20260116_1234_Image-Generation_simple_compose_01kf2sx0kfe8rbaznmd32940ph-1-smartcrop-363x181.png\" type=\"image\/jpeg\"\/><img decoding=\"async\" src=\"https:\/\/coinjournal.net\/wp-content\/uploads\/2026\/01\/20260116_1234_Image-Generation_simple_compose_01kf2sx0kfe8rbaznmd32940ph-1.png\" alt=\"DeadLock ransomware abuses Polygon blockchain to rotate proxy servers quietly\" width=\"100%\" height=\"100%\"\/>\n<\/picture>                            <\/div>\n<\/p><\/div>\n<ul>\n<li data-start=\"81\" data-end=\"326\">Group-IB revealed its report on Jan. 15 and stated the tactic may make disruption more durable for defenders.<\/li>\n<li data-start=\"81\" data-end=\"326\">The malware reads on-chain knowledge, so victims don&#8217;t pay fuel charges.<\/li>\n<li data-start=\"81\" data-end=\"326\">Researchers stated Polygon will not be weak, however the tactic may unfold.<\/li>\n<\/ul>\n<p data-start=\"81\" data-end=\"326\">Ransomware teams often depend on command-and-control servers to handle communications after breaking right into a system.<\/p>\n<p data-start=\"81\" data-end=\"326\">But safety researchers now say a low-profile pressure is utilizing blockchain infrastructure in a means that may very well be more durable to block.<\/p>\n<p data-start=\"328\" data-end=\"799\">In a <a href=\"https:\/\/www.group-ib.com\/blog\/deadlock-ransomware-polygon-smart-contracts\/\">report published on Jan. 15<\/a>, cybersecurity agency Group-IB stated a ransomware operation often called DeadLock is abusing Polygon (POL) sensible contracts to retailer and rotate proxy server addresses.<\/p>\n<p data-start=\"328\" data-end=\"799\">These proxy servers are used to relay communication between attackers and victims after methods are contaminated.<\/p>\n<p data-start=\"328\" data-end=\"799\">Because the knowledge sits on-chain and could be up to date anytime, researchers warned that this strategy may make the group\u2019s backend extra resilient and more durable to disrupt.<\/p>\n<h2 data-start=\"801\" data-end=\"851\">Smart contracts used to retailer proxy data<\/h2>\n<p data-start=\"853\" data-end=\"1084\">Group-IB stated DeadLock doesn&#8217;t depend upon the standard setup of fastened command-and-control servers.<\/p>\n<p data-start=\"853\" data-end=\"1084\">Instead, as soon as a machine is compromised and encrypted, the ransomware queries a particular sensible contract deployed on the Polygon community.<\/p>\n<p data-start=\"1086\" data-end=\"1422\">That contract shops the most recent proxy deal with that DeadLock makes use of to talk. The proxy acts as a center layer, serving to attackers preserve contact with out exposing their principal infrastructure straight.<\/p>\n<p data-start=\"1086\" data-end=\"1422\">Since the sensible contract knowledge is publicly readable, the malware can retrieve the small print with out sending any blockchain transactions.<\/p>\n<p data-start=\"1424\" data-end=\"1608\">This additionally means victims don&#8217;t want to pay fuel charges or work together with wallets.<\/p>\n<p data-start=\"1424\" data-end=\"1608\">DeadLock solely reads the knowledge, treating the blockchain as a persistent supply of configuration knowledge.<\/p>\n<h2 data-start=\"1610\" data-end=\"1660\">Rotating infrastructure with out malware updates<\/h2>\n<p data-start=\"1662\" data-end=\"1876\">One motive this methodology stands out is how shortly attackers can change their communication routes.<\/p>\n<p data-start=\"1662\" data-end=\"1876\">Group-IB stated the actors behind DeadLock can replace the proxy deal with saved contained in the contract each time mandatory.<\/p>\n<p data-start=\"1878\" data-end=\"2255\">That provides them the power to rotate infrastructure with out modifying the ransomware itself or pushing new variations into the wild.<\/p>\n<p data-start=\"1878\" data-end=\"2255\">In conventional ransomware instances, defenders can generally block site visitors by figuring out identified command-and-control servers.<\/p>\n<p data-start=\"1878\" data-end=\"2255\">But with an on-chain proxy listing, any proxy that will get flagged could be changed just by updating the contract\u2019s saved worth.<\/p>\n<p data-start=\"2257\" data-end=\"2422\">Once contact is established by way of the up to date proxy, victims obtain ransom calls for together with threats that stolen data can be offered if fee will not be made.<\/p>\n<h2 data-start=\"2424\" data-end=\"2462\">Why takedowns change into harder<\/h2>\n<p data-start=\"2464\" data-end=\"2756\">Group-IB warned that utilizing blockchain knowledge this fashion makes disruption considerably more durable.<\/p>\n<p data-start=\"2464\" data-end=\"2756\">There is not any single central server that may be seized, eliminated, or shut down.<\/p>\n<p data-start=\"2464\" data-end=\"2756\">Even if a particular proxy deal with is blocked, the attackers can swap to one other one with out having to redeploy the malware.<\/p>\n<p data-start=\"2758\" data-end=\"3087\">Since the sensible contract stays accessible by way of Polygon\u2019s distributed nodes worldwide, the configuration knowledge can proceed to exist even when the infrastructure on the attackers\u2019 aspect modifications.<\/p>\n<p data-start=\"2758\" data-end=\"3087\">Researchers stated this provides ransomware operators a extra resilient command-and-control mechanism in contrast with typical internet hosting setups.<\/p>\n<h2 data-start=\"3089\" data-end=\"3133\">A small marketing campaign with an creative methodology<\/h2>\n<p data-start=\"3135\" data-end=\"3297\">DeadLock was first noticed in July 2025 and has stayed comparatively low profile thus far.<\/p>\n<p data-start=\"3135\" data-end=\"3297\">Group-IB stated the operation has solely a restricted variety of confirmed victims.<\/p>\n<p data-start=\"3299\" data-end=\"3607\">The report additionally famous that DeadLock will not be linked to identified ransomware affiliate programmes and doesn&#8217;t seem to function a public knowledge leak website.<\/p>\n<p data-start=\"3299\" data-end=\"3607\">While which will clarify why the group has acquired much less consideration than main ransomware manufacturers, researchers stated its technical strategy deserves shut monitoring.<\/p>\n<p data-start=\"3609\" data-end=\"3733\">Group-IB warned that even when DeadLock stays small, its approach may very well be copied by extra established cybercriminal teams.<\/p>\n<h2 data-start=\"3735\" data-end=\"3771\">No Polygon vulnerability concerned<\/h2>\n<p data-start=\"3773\" data-end=\"3981\">The researchers harassed that DeadLock will not be exploiting any vulnerability in Polygon itself.<\/p>\n<p data-start=\"3773\" data-end=\"3981\">It can also be not attacking third-party sensible contracts akin to decentralised finance protocols, wallets, or bridges.<\/p>\n<p data-start=\"3983\" data-end=\"4257\">Instead, the attackers are abusing the general public and immutable nature of blockchain knowledge to cover configuration data.<\/p>\n<p data-start=\"3983\" data-end=\"4257\">Group-IB in contrast the approach to earlier \u201cEtherHiding\u201d approaches, the place criminals used blockchain networks to distribute malicious configuration knowledge.<\/p>\n<p data-start=\"4259\" data-end=\"4532\">Several sensible contracts related to the marketing campaign have been deployed or up to date between August and Nov. 2025, in accordance to the agency\u2019s evaluation.<\/p>\n<p data-start=\"4259\" data-end=\"4532\">Researchers stated the exercise stays restricted for now, however the idea may very well be reused in many various types by different risk actors.<\/p>\n<p data-start=\"4534\" data-end=\"4797\">While Polygon customers and builders aren&#8217;t dealing with direct threat from this particular marketing campaign, Group-IB stated the case is one other reminder that public blockchains could be misused to help off-chain legal exercise in methods which might be troublesome to detect and dismantle.<\/p>\n<div class=\"post-meta\">\n<hr class=\"mb-6\"\/>\n<h6 class=\"text-3xl  mb-4  text-green-300\">Share this text<\/h6>\n<hr class=\"mb-6\"\/>\n<h6 class=\"text-3xl  mb-4  text-green-300\">Categories<\/h6>\n<hr class=\"mb-6\"\/>\n<h6 class=\"text-3xl  mb-4  text-green-300\">Tags<\/h6>\n<\/p><\/div>\n<\/p><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/coinjournal.net\/news\/deadlock-ransomware-abuses-polygon-blockchain-to-rotate-proxy-servers-quietly\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Group-IB revealed its report on Jan. 15 and stated the tactic may make disruption more durable for defenders. The malware reads on-chain knowledge, so victims don&#8217;t pay fuel charges. Researchers stated Polygon will not be weak, however the tactic may unfold. Ransomware teams often depend on command-and-control servers to handle communications after breaking right into [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":88832,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[14689,382,14688,351,11097,3699,8406,14690,14691],"class_list":{"0":"post-88830","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blockchain","8":"tag-abuses","9":"tag-blockchain","10":"tag-deadlock","11":"tag-polygon","12":"tag-proxy","13":"tag-quietly","14":"tag-ransomware","15":"tag-rotate","16":"tag-servers"},"_links":{"self":[{"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/posts\/88830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/comments?post=88830"}],"version-history":[{"count":1,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/posts\/88830\/revisions"}],"predecessor-version":[{"id":88831,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/posts\/88830\/revisions\/88831"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/media\/88832"}],"wp:attachment":[{"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/media?parent=88830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/categories?post=88830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/tags?post=88830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}