Close Menu
StreamLineCrypto.comStreamLineCrypto.com
  • Home
  • Crypto News
  • Bitcoin
  • Altcoins
  • NFT
  • Defi
  • Blockchain
  • Metaverse
  • Regulations
  • Trading
What's Hot

Interactive Brokers Allows Account Funding With USDC

January 16, 2026

Bitcoin And Crypto ETFs Set To Attract $130 Billion-Plus Inflows This Year, JPMorgan Predicts

January 16, 2026

Ransomware group uses Polygon to evade takedowns

January 16, 2026
Facebook X (Twitter) Instagram
Friday, January 16 2026
  • Contact Us
  • Privacy Policy
  • Cookie Privacy Policy
  • Terms of Use
  • DMCA
Facebook X (Twitter) Instagram
StreamLineCrypto.comStreamLineCrypto.com
  • Home
  • Crypto News
  • Bitcoin
  • Altcoins
  • NFT
  • Defi
  • Blockchain
  • Metaverse
  • Regulations
  • Trading
StreamLineCrypto.comStreamLineCrypto.com

Ransomware group uses Polygon to evade takedowns

January 16, 2026Updated:January 16, 2026No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Ransomware group uses Polygon to evade takedowns
Share
Facebook Twitter LinkedIn Pinterest Email
ad

Safety researchers say a low-profile ransomware group is utilizing Polygon sensible contracts to cover and rotate its command-and-control infrastructure.

Abstract

  • DeadLock ransomware, first noticed in July 2025, shops rotating proxy addresses inside Polygon sensible contracts to evade takedowns.
  • The approach depends solely on studying on-chain information and doesn’t exploit vulnerabilities in Polygon or different sensible contracts.
  • Researchers warn the tactic is affordable, decentralized, and troublesome to dam, despite the fact that the marketing campaign has restricted confirmed victims thus far.

Cybersecurity researchers are warning {that a} lately recognized ransomware pressure is utilizing Polygon sensible contracts in an uncommon approach that might make its infrastructure more durable to disrupt.

In a report printed on Jan. 15, researchers at cybersecurity agency Group-IB stated the ransomware, referred to as DeadLock, is abusing publicly readable sensible contracts on the Polygon (POL) community to retailer and rotate proxy server addresses used to speak with contaminated victims.

DeadLock was first noticed in July 2025 and has remained comparatively low profile since then. Group-IB stated the operation has a restricted variety of confirmed victims and isn’t linked to any recognized ransomware affiliate packages or public information leak websites.

Regardless of its low visibility, the agency warned that the methods getting used are extremely creative and will pose critical dangers if copied by extra established teams.

How the approach works

As a substitute of counting on conventional command-and-control servers, which might usually be blocked or taken offline, DeadLock embeds code that queries a selected Polygon sensible contract after a system has been contaminated and encrypted. That contract shops the present proxy tackle used to relay communication between the attackers and the sufferer.

As a result of the information is saved on-chain, attackers can replace the proxy tackle at any time, permitting them to rotate infrastructure shortly with out redeploying malware. Victims don’t must ship transactions or pay fuel charges, because the ransomware solely performs learn operations on the blockchain.

As soon as contact is established, victims obtain ransom calls for together with threats that stolen information will likely be offered if cost will not be made. Group-IB famous that this method makes the ransomware’s infrastructure way more resilient.

There isn’t a central server to close down, and the contract information stays obtainable throughout distributed nodes worldwide, making takedowns considerably tougher.

No Polygon vulnerability concerned

The researchers careworn that DeadLock will not be exploiting flaws in Polygon itself or in third-party sensible contracts corresponding to decentralized finance protocols, wallets, or bridges. The ransomware is solely abusing the general public and immutable nature of blockchain information to cover configuration data, a technique just like earlier “EtherHiding” methods.

A number of sensible contracts linked to the marketing campaign had been deployed or up to date between August and Nov. 2025, based on Group-IB’s evaluation. Whereas the exercise stays restricted for now, the agency warned that the idea may very well be reused in numerous variations by different risk actors.

Whereas Polygon customers and builders aren’t dealing with direct threat from the marketing campaign, researchers say the case highlights how public blockchains might be misused to help off-chain felony exercise in methods which are troublesome to detect and dismantle.

ad
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Related Posts

Interactive Brokers Allows Account Funding With USDC

January 16, 2026

Bitcoin And Crypto ETFs Set To Attract $130 Billion-Plus Inflows This Year, JPMorgan Predicts

January 16, 2026

DeadLock Malware Exploits Polygon Smart Contracts to Hide

January 16, 2026

Bitcoin Reclaims $97K As Long-Term Holders Supply Stays Locked

January 16, 2026
Add A Comment
Leave A Reply Cancel Reply

ad
What's New Here!
Interactive Brokers Allows Account Funding With USDC
January 16, 2026
Bitcoin And Crypto ETFs Set To Attract $130 Billion-Plus Inflows This Year, JPMorgan Predicts
January 16, 2026
Ransomware group uses Polygon to evade takedowns
January 16, 2026
Anthropic Taps Microsoft India Veteran Irina Ghose to Lead Bengaluru Expansion
January 16, 2026
DeadLock Malware Exploits Polygon Smart Contracts to Hide
January 16, 2026
Facebook X (Twitter) Instagram Pinterest
  • Contact Us
  • Privacy Policy
  • Cookie Privacy Policy
  • Terms of Use
  • DMCA
© 2026 StreamlineCrypto.com - All Rights Reserved!

Type above and press Enter to search. Press Esc to cancel.