Cryptocnews-Crypto News, Cryptocurrency News, Blockchain News, NFT News
    What's Hot

    From marginal experiment to global market infrastructure: Tokenization is rewriting finance

    01/27/2026

    Stablecoin Outflows Signal Capital Exit as Bitcoin Trades Flat

    01/27/2026

    Crypto Funds See Record Exodus: $1.7 Billion Leaves Market

    01/27/2026
    Facebook Twitter Instagram
    • Business
    • Markets
    • Get In Touch
    • Our Authors
    Facebook Twitter Instagram
    Cryptocnews-Crypto News, Cryptocurrency News, Blockchain News, NFT News
    • Home
    • Business

      Binance Co-Founder Declines Return After Trump Pardon

      01/26/2026

      BlackRock Files With SEC to Launch iShares Bitcoin Premium Income ETF

      01/26/2026

      Ether could retest the $2,749 support level: Check forecast

      01/26/2026

      AXS price pumps 12% as Axie Infinity outpaces gaming sector tokens

      01/26/2026

      Algorand price bounces on 170% volume surge

      01/26/2026
    • Technology
      1. Business
      2. Insights
      3. View All

      Binance Co-Founder Declines Return After Trump Pardon

      01/26/2026

      BlackRock Files With SEC to Launch iShares Bitcoin Premium Income ETF

      01/26/2026

      Ether could retest the $2,749 support level: Check forecast

      01/26/2026

      AXS price pumps 12% as Axie Infinity outpaces gaming sector tokens

      01/26/2026

      Crypto Funds See Record Exodus: $1.7 Billion Leaves Market

      01/27/2026

      XRP, HBAR, And Litecoin: Pundit Highlights Coins To Watch In 2026

      01/26/2026

      Bitcoin’s Coinbase Premium Stays Deeply Negative, Signaling Weak U.S. Spot Demand

      01/26/2026

      Stablecoin Liquidity Breaks Lower as $7B Exits Crypto in a Single Week

      01/26/2026

      From marginal experiment to global market infrastructure: Tokenization is rewriting finance

      01/27/2026

      Stablecoin Outflows Signal Capital Exit as Bitcoin Trades Flat

      01/27/2026

      North Korea–Linked Hackers Use Deepfake Video Calls to Target Crypto Workers

      01/27/2026

      TikTok Backlash Fuels Sudden Surge in Little-Known Australian Social App

      01/27/2026
    • Insights
      1. Bitcoin
      2. Ethereum
      3. Eurozone
      4. Monero
      5. View All

      Stablecoin Liquidity Breaks Lower as $7B Exits Crypto in a Single Week

      01/26/2026

      Ether could retest the $2,749 support level: Check forecast

      01/26/2026

      AXS price pumps 12% as Axie Infinity outpaces gaming sector tokens

      01/26/2026

      Algorand price bounces on 170% volume surge

      01/26/2026

      Bitcoin’s Coinbase Premium Stays Deeply Negative, Signaling Weak U.S. Spot Demand

      01/26/2026

      Ether could retest the $2,749 support level: Check forecast

      01/26/2026

      AXS price pumps 12% as Axie Infinity outpaces gaming sector tokens

      01/26/2026

      Algorand price bounces on 170% volume surge

      01/26/2026

      Ether could retest the $2,749 support level: Check forecast

      01/26/2026

      AXS price pumps 12% as Axie Infinity outpaces gaming sector tokens

      01/26/2026

      Algorand price bounces on 170% volume surge

      01/26/2026

      Massive Colombian Pension To Launch Bitcoin Fund For Clients

      01/26/2026

      Ether could retest the $2,749 support level: Check forecast

      01/26/2026

      AXS price pumps 12% as Axie Infinity outpaces gaming sector tokens

      01/26/2026

      Algorand price bounces on 170% volume surge

      01/26/2026

      Zilliqa (ZIL) price slides amid exchange delistings and supply update

      01/26/2026

      Crypto Funds See Record Exodus: $1.7 Billion Leaves Market

      01/27/2026

      XRP, HBAR, And Litecoin: Pundit Highlights Coins To Watch In 2026

      01/26/2026

      Bitcoin’s Coinbase Premium Stays Deeply Negative, Signaling Weak U.S. Spot Demand

      01/26/2026

      Stablecoin Liquidity Breaks Lower as $7B Exits Crypto in a Single Week

      01/26/2026
    • Markets
    • Get In Touch
    Cryptocnews-Crypto News, Cryptocurrency News, Blockchain News, NFT News
    Home»Technology»DeadLock Ransomware Using Polygon Smart Contracts to Evade Detection
    Technology

    DeadLock Ransomware Using Polygon Smart Contracts to Evade Detection

    adminBy admin01/16/2026No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email



    In brief

    • Cybersecurity firm Group-IB has warned that ransomware family DeadLock is using Polygon smart contracts to distribute and rotate proxy server addresses, helping it evade detection.
    • The ransomware has stayed under the radar due to few victims, no affiliate program, and no public data leak site.
    • The technique mirrors Google’s disclosures last year concerning “EtherHiding,” which abuses Ethereum smart contracts to conceal malware.

    A newly discovered strain of ransomware is using Polygon smart contracts for proxy server address rotation and distribution to infiltrate devices, cybersecurity firm Group‑IB warned on Thursday.

    The malware, dubbed DeadLock, was first identified in July 2025 and has so far attracted little attention because it lacks a public affiliate program and a data‑leak site and has infected only a limited number of victims, according to the company.

    🚨 DeadLock Ransomware: When Blockchain Meets Cybercrime

    Group-IB has uncovered a sophisticated new threat rewriting the ransomware playbook. DeadLock leverages Polygon smart contracts to rotate proxy addresses, a stealthy, under-reported technique that bypasses traditional… pic.twitter.com/rlPu9gZd5F

    — Group-IB Global (@GroupIB) January 15, 2026

    “Although it’s low profile and yet low impact, it applies innovative methods that showcases an evolving skillset which might become dangerous if organizations do not take this emerging threat seriously,” Group-IB said in a blog.

    DeadLock’s use of smart contracts to deliver proxy addresses is “an interesting method where attackers can literally apply infinite variants of this technique; imagination is the limit,” the firm noted. Group-IB pointed to a recent report by the Google Threat Intelligence Group highlighting the use of a similar technique called “EtherHiding” employed by North Korean hackers.

    What is EtherHiding?

    EtherHiding is a campaign disclosed last year in which DPRK hackers used the Ethereum blockchain to conceal and deliver malicious software. Victims are typically lured through compromised websites—often WordPress pages—that load a small snippet of JavaScript. That code then pulls the hidden payload from the blockchain, allowing attackers to distribute malware in a way that is highly resilient to takedowns.

    Both EtherHiding and DeadLock repurpose public, decentralized ledgers as covert channels that are difficult for defenders to block or dismantle. DeadLock takes advantage of rotating proxies, which are servers that regularly change the IP of a user, making it harder to track or block.

    While Group‑IB admitted that “initial access vectors and other important stages of the attacks remain unknown at this point,” it said DeadLock infections rename encrypted files with a “.dlock” extension and replace desktop backgrounds with ransom notes.

    Newer versions also warn victims that sensitive data has been stolen and could be sold or leaked if a ransom is not paid. At least three variants of the malware have been identified so far.

    Earlier versions relied on allegedly compromised servers, but researchers now believe the group operates its own infrastructure. The key innovation, however, lies in how DeadLock retrieves and manages server addresses.

    “Group-IB researchers uncovered JS code within the HTML file that interacts with a smart contract over the Polygon network,” it explained. “This RPC list contains the available endpoints for interacting with the Polygon network or blockchain, acting as gateways that connect applications to the blockchain’s existing nodes.”

    Its most recently observed version also embeds communication channels between the victim and attacker. DeadLock drops a HTML file that acts as a wrapper around the encrypted messaging app Session.

    “The main purpose of the HTML file is to facilitate direct communication between the DeadLock operator and the victim,” Group‑IB said.

    Daily Debrief Newsletter

    Start every day with the top news stories right now, plus original features, a podcast, videos and more.





    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    From marginal experiment to global market infrastructure: Tokenization is rewriting finance

    01/27/2026

    Stablecoin Outflows Signal Capital Exit as Bitcoin Trades Flat

    01/27/2026

    North Korea–Linked Hackers Use Deepfake Video Calls to Target Crypto Workers

    01/27/2026

    TikTok Backlash Fuels Sudden Surge in Little-Known Australian Social App

    01/27/2026
    Add A Comment

    Leave A Reply Cancel Reply

    Top Posts

    Millennials Are Quitting Job to Become Day Traders

    01/20/2021

    Jack Dorsey Says Bitcoin Will Unite The World

    01/15/2021

    Hong Kong Customs Arrest Four in Crypto Laundering Bust

    01/15/2021

    Subscribe to Updates

    Get the latest sports news from SportsSite about soccer, football and tennis.

    Advertisement
    Demo
    Facebook Twitter Instagram Pinterest YouTube
    Top Insights

    From marginal experiment to global market infrastructure: Tokenization is rewriting finance

    01/27/2026

    Stablecoin Outflows Signal Capital Exit as Bitcoin Trades Flat

    01/27/2026
    Get Informed

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © {2025} Copyright CryptocNews.com
    • Home
    • Business
    • Markets
    • Technology
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.