M
MercyNews
Home
Back
DeadLock Ransomware Exploits Polygon Smart Contracts
Technology

DeadLock Ransomware Exploits Polygon Smart Contracts

CoinTelegraph2h ago
3 min read
📋

Key Facts

  • ✓ Cybersecurity researchers have identified a new ransomware strain named DeadLock that is actively targeting the Polygon blockchain.
  • ✓ The malware exploits smart contracts on Polygon to rotate proxy addresses, making its command-and-control infrastructure highly resilient to takedowns.
  • ✓ DeadLock represents a significant shift in ransomware tactics, moving from traditional server-based infrastructure to decentralized blockchain-based systems.
  • ✓ The use of Polygon smart contracts allows attackers to automate the rotation of communication channels, complicating efforts by security teams to track and disrupt the malware.
  • ✓ This technique highlights the growing convergence of cryptocurrency technology and cybercrime, posing new challenges for law enforcement and cybersecurity professionals.

In This Article

  1. Quick Summary
  2. The Polygon Exploit
  3. Evasion Tactics
  4. Implications for Cybersecurity
  5. The Technical Mechanism
  6. Looking Ahead

Quick Summary#

A new and sophisticated ransomware strain, dubbed DeadLock, has been identified by cybersecurity researchers. The malware represents a significant evolution in cybercriminal tactics by leveraging the Polygon blockchain to conceal its operations.

According to findings from Group-IB, the ransomware is actively exploiting smart contracts on the Polygon network. This allows attackers to rotate proxy addresses dynamically, creating a moving target that is exceptionally difficult for security teams and law enforcement to track and dismantle.

The Polygon Exploit#

The core of DeadLock's evasion strategy lies in its manipulation of smart contracts. Smart contracts are self-executing programs on the blockchain that automatically run when predetermined conditions are met. In this case, the ransomware operators have found a way to exploit these contracts to serve a malicious purpose.

By compromising specific smart contracts on the Polygon network, the attackers can rotate proxy addresses. A proxy address acts as a middleman, redirecting traffic from the victim's computer to the attacker's command and control server. By constantly changing these addresses via the blockchain, DeadLock ensures that even if one address is identified and blocked, the malware can instantly switch to a new, unblocked address.

This method provides a decentralized and resilient infrastructure for the ransomware. Unlike traditional botnets that rely on centralized servers, which can be seized or taken offline, DeadLock's command infrastructure is embedded within the Polygon blockchain, making it significantly more robust.

Evasion Tactics#

The primary benefit of using blockchain technology for infrastructure is the inherent difficulty in censorship. Once a smart contract is deployed on a public blockchain like Polygon, it is immutable and can be accessed by anyone. DeadLock's operators have weaponized this feature to create a self-sustaining evasion mechanism.

Traditional ransomware takedowns often involve seizing domain names or shutting down servers hosted in specific jurisdictions. However, DeadLock's use of smart contracts bypasses these conventional methods. Security researchers cannot simply "pull the plug" on the infrastructure because it exists across a distributed network of nodes worldwide.

The proxy rotation is automated and triggered by the smart contract itself. This means the ransomware's communication channels are constantly shifting, making it nearly impossible for network defenders to establish a static blocklist. This technique highlights a growing trend where cybercriminals are adopting advanced technologies to stay ahead of detection efforts.

Implications for Cybersecurity#

The emergence of DeadLock signals a dangerous convergence of cryptocurrency and cybercrime. It demonstrates that ransomware groups are not just using cryptocurrencies for payments but are now actively exploiting the underlying infrastructure of blockchain networks to facilitate their attacks.

This development poses new challenges for cybersecurity firms and law enforcement agencies. The decentralized nature of blockchain-based infrastructure complicates attribution and prosecution. Identifying the individuals behind the operation requires tracing complex transactions across multiple wallets and smart contracts.

Furthermore, the use of Polygon, a popular Layer-2 scaling solution for Ethereum, suggests that attackers are targeting networks with high transaction volumes and active developer communities. This ensures that the exploited smart contracts blend in with legitimate network activity, making detection even more challenging for automated security systems.

The Technical Mechanism#

At a technical level, the DeadLock ransomware operates by embedding a function call to a compromised smart contract within its code. When the malware executes on a victim's machine, it queries the smart contract to retrieve the current proxy address for its command and control server.

The smart contract acts as a dynamic directory. The attackers can update the address stored in the contract at any time, and all infected machines will automatically fetch the new address on their next communication attempt. This creates a resilient command-and-control (C2) channel that is resistant to traditional takedown methods.

Key technical aspects of this attack vector include:

  • Blockchain Immutability: Once deployed, the malicious smart contract code cannot be altered, ensuring persistent access.
  • Decentralized Infrastructure: No single server or domain can be seized to disrupt the entire network.
  • Automated Proxy Rotation: The malware dynamically updates its connection points without manual intervention from the attackers.

Looking Ahead#

The discovery of DeadLock underscores the need for cybersecurity professionals to adapt their defense strategies. Monitoring blockchain transactions and analyzing smart contract activity may become essential components of modern threat intelligence.

As ransomware groups continue to innovate, the industry must develop new tools capable of detecting and mitigating threats that leverage decentralized technologies. The battle between attackers and defenders is increasingly moving onto the blockchain itself.

Organizations should remain vigilant and ensure their security protocols are updated to address these emerging threats. The DeadLock case serves as a stark reminder that cybercriminals are quick to adopt new technologies to evade capture and maximize the impact of their attacks.

Continue scrolling for more

AI Transforms Mathematical Research and Proofs
Technology

AI Transforms Mathematical Research and Proofs

Artificial intelligence is shifting from a promise to a reality in mathematics. Machine learning models are now generating original theorems, forcing a reevaluation of research and teaching methods.

Just now
4 min
218
Read Article
Macron says Ukraine now relies on France, instead of the US, for intelligence
Politics

Macron says Ukraine now relies on France, instead of the US, for intelligence

French President Emmanuel Macron said his country is now providing Ukraine with "two-thirds" of its intelligence. Philippe Magoni / POOL / AFP via Getty Images Emmanuel Macron said that France, not the US, is now the leader in intelligence-sharing with Ukraine. The French president said that Paris now provides "two-thirds" of Ukraine's intelligence. While it's unclear what that means, it suggests the US is no longer sharing intel as extensively with Kyiv. French President Emmanuel Macron said on Thursday that his country has now overtaken the US as the main provider of intelligence to Ukraine. "Where Ukraine was overwhelmingly dependent on American intelligence capacity, a year ago, two-thirds is today provided by France. Two-thirds," Macron said in a New Year's speech to the French military. The French leader's comments indicate a shift in the dynamics of Western contributions to the war and suggest that the US may have scaled back its military relationship with Ukraine. The US briefly suspended intelligence-sharing and aid to Ukraine in March 2025, as the Trump administration was attempting to negotiate a ceasefire between Kyiv and Moscow. After roughly a week, Washington said it was lifting the suspension. But it's been unclear so far whether the Pentagon has continued to provide intelligence at the same level as it did during the Biden administration. The New York Times previously reported that, in those years, US-Ukrainian intelligence-sharing ties had been so close that officials from both countries worked in the same facility to coordinate military strikes. One of the most vital roles played by US intelligence at the time was providing targeting data and situational awareness for Ukrainian troops, especially when the latter were using American-made systems for the attacks. Ukraine has since been trying to develop its own strike capabilities, including long-range precision missiles, that might allow it to strike Russia without Western approval. It's also unclear exactly how Macron quantified two-thirds of Ukrainian intelligence capabilities. His speech did not say whether he was referring to two-thirds of the intelligence provided by Ukraine's foreign partners or to two-thirds of all the intelligence used by Ukraine's forces. The Élysée Palace and French defense ministry did not respond to requests for comment sent outside regular business hours. Ukraine's defense ministry and the Pentagon have also not responded to similar requests for comment on Macron's remarks. The French president's point on intelligence-sharing with Ukraine aligns with his larger push to position Paris as a regional military leader, while the Trump administration seeks to curb American involvement in Europe. President Donald Trump has also recently rattled European leaders by alluding that the US could try to take over Greenland, a Danish territory. Macron said on Thursday that France had helped Ukraine to rebuild its forces and provided Kyiv with security guarantees in the event of a ceasefire. Last week, European NATO members and the US issued a declaration that said willing countries would form a multinational, "European-led" force to provide "reassurances" to Ukraine and stave off a second Russian invasion or attack. "The signal sent to our Ukrainian partners, to other Europeans, and to the world is that we are ready," Macron said. "We are ready to sustain this effort of resistance. We are ready to deter new aggressions or to maintain peace on our soil." Read the original article on Business Insider

34m
3 min
0
Read Article
Plane chaos erupts after passenger puts a bomb threat in their mobile hotspot name
Accidents

Plane chaos erupts after passenger puts a bomb threat in their mobile hotspot name

A Turkish Airlines plane made an emergency landing in Barcelona. Christophe Gateau/picture alliance via Getty Images A Turkish Airlines plane had to make a landing after a bomb threat was discovered aboard. The plane's crew detected a passenger's hot spot that had a bomb threat in its name. The plane landed safely in Barcelona 30 minutes behind schedule. A passenger's choice of a hot spot name forced a plane to make a landing. The Turkish Airlines flight, TK1853, was en route from Istanbul to Barcelona on Thursday morning when the crew reported a bomb threat aboard. The airline's spokesperson, Yahya Üstün, said in a Thursday post on X, "It was detected that a passenger had set up an in-flight internet access point and configured its network name to include a bomb threat." He said that the aircraft, an Airbus A321, made a safe landing at Barcelona's El Prat airport, following which Spanish authorities conducted an investigation. In a follow-up post, Üstün said, "No irregularities were found," and that authorities were working to identify the offending passenger. Per data from the aircraft tracking website FlightRadar24, the flight made two loops off the eastern coast of Barcelona about three hours into the flight, circled for about 20 minutes before continuing to Barcelona. Spain's Civil Guard told Reuters that the plane was inspected after passengers disembarked, and no explosives had been found. It reached Barcelona at about 11 a.m. on Thursday, 30 minutes later than scheduled. Representatives for Turkish Airlines and the Spanish Civil Guard did not respond to requests for comment from Business Insider. This is not the first time in recent years that a plane has had to make an expeditious landing because of a bomb threat. In October 2024, an Air India flight to Chicago, with more than 200 passengers on board, was diverted to a remote Canadian town due to an apparent bomb threat. And in November 2023, A United Airlines flight from Los Angeles to Vancouver was diverted to San Francisco because of a bomb threat, airport officials in San Francisco said. Read the original article on Business Insider

35m
3 min
0
Read Article
California Fines Crypto Wealth Platform Nexo $500K Over 'Unlicensed' Loans
Cryptocurrency

California Fines Crypto Wealth Platform Nexo $500K Over 'Unlicensed' Loans

Nexo faces fresh headwinds as California regulators take action against the digital assets platform for the second time in three years.

35m
3 min
0
Read Article
Switzerland Is Asking Itself: Is 10 Million People Too Many?
Politics

Switzerland Is Asking Itself: Is 10 Million People Too Many?

As the world flocks to Davos, the host country ponders a population cap

36m
3 min
0
Read Article
EU ‘membership-lite’ plan for Ukraine spooks European capitals
Politics

EU ‘membership-lite’ plan for Ukraine spooks European capitals

Reforms under discussion would tear up accession rules used since cold war to allow Kyiv to join in a potential peace deal

36m
3 min
0
Read Article
How Iran’s regime retook the streets
Politics

How Iran’s regime retook the streets

Details emerge of unprecedented crackdown, raising questions over future of protest movement

36m
3 min
0
Read Article
European Troops Deploy to Greenland Amid US Sovereignty Claims
Politics

European Troops Deploy to Greenland Amid US Sovereignty Claims

Several European countries have dispatched soldiers to Greenland in a show of support for Denmark. The US has stated this move will not alter President Trump's intention to acquire the island.

57m
3 min
6
Read Article
Blood Donation Marathon Hits Catalonia This Weekend
Health

Blood Donation Marathon Hits Catalonia This Weekend

Major events including concerts by Milo J and Rusowsky, plus a vertical race at Torre Glòries, are coinciding with a widespread blood donation campaign across Catalonia this weekend.

1h
3 min
6
Read Article
Netflix Ends Casting Support: What It Means for Viewers
Technology

Netflix Ends Casting Support: What It Means for Viewers

In a surprising move, Netflix has eliminated a key feature from its mobile apps, restricting the popular 'cast' function to a limited selection of devices. This decision marks a significant departure from the company's previous approach to cross-platform viewing.

1h
5 min
6
Read Article
🎉

You're all caught up!

Check back later for more stories

Back to Home