- Community-IB revealed its characterize on Jan. 15 and acknowledged the technique can also invent disruption extra troublesome for defenders.
- The malware reads on-chain recordsdata, so victims attain no longer pay fuel expenses.
- Researchers acknowledged Polygon is now not any longer inclined, nonetheless the tactic can also spread.
Ransomware groups veritably depend on uncover-and-administration servers to administer communications after breaking into a blueprint.
However security researchers now issue a low-profile stress is the use of blockchain infrastructure in a system that will be extra troublesome to dam.
In a characterize revealed on Jan. 15, cybersecurity agency Community-IB acknowledged a ransomware operation acknowledged as DeadLock is abusing Polygon (POL) super contracts to retailer and rotate proxy server addresses.
These proxy servers are dilapidated to relay communication between attackers and victims after systems are contaminated.
Because the facts sits on-chain and could effectively be updated anytime, researchers warned that this come can also invent the group’s backend extra resilient and more challenging to disrupt.
Orderly contracts dilapidated to retailer proxy recordsdata
Community-IB acknowledged DeadLock does no longer depend upon the novel setup of mounted uncover-and-administration servers.
As every other, as soon as a machine is compromised and encrypted, the ransomware queries a particular super contract deployed on the Polygon community.
That contract stores the most up-to-date proxy take care of that DeadLock uses to communicate. The proxy acts as a middle layer, serving to attackers take care of contact without exposing their fundamental infrastructure straight.
Because the super contract recordsdata is publicly readable, the malware can retrieve the facts without sending any blockchain transactions.
This additionally manner victims attain no longer want to pay fuel expenses or private interaction with wallets.
DeadLock very best reads the facts, treating the blockchain as a persistent offer of configuration recordsdata.
Rotating infrastructure without malware updates
One motive this arrangement stands out is how like a flash attackers can substitute their communication routes.
Community-IB acknowledged the actors in the merit of DeadLock can substitute the proxy take care of kept inside the contract each time considerable.
That provides them the flexibility to rotate infrastructure without bettering the ransomware itself or pushing contemporary versions into the wild.
In feeble ransomware cases, defenders can in most cases block visitors by figuring out acknowledged uncover-and-administration servers.
However with an on-chain proxy checklist, any proxy that gets flagged would be modified merely by updating the contract’s kept tag.
Once contact is established via the updated proxy, victims obtain ransom calls for along with threats that stolen recordsdata shall be sold if price is now not any longer made.
Why takedowns become extra complicated
Community-IB warned that the use of blockchain recordsdata this variety makes disruption a good deal extra troublesome.
There isn’t very any longer any single central server that would be seized, eliminated, or shut down.
Despite the true fact that a particular proxy take care of is blocked, the attackers can switch to 1 other one without having to redeploy the malware.
Because the super contract stays accessible via Polygon’s dispensed nodes worldwide, the configuration recordsdata can continue to exist although the infrastructure on the attackers’ side modifications.
Researchers acknowledged this gives ransomware operators a extra resilient uncover-and-administration mechanism in contrast with feeble web hosting setups.
A tiny campaign with an creative technique
DeadLock was as soon as first observed in July 2025 and has stayed slightly low profile to this point.
Community-IB acknowledged the operation has very best a restricted preference of confirmed victims.
The characterize additionally illustrious that DeadLock is now not any longer linked to acknowledged ransomware affiliate programmes and does no longer appear to diagram a public recordsdata leak living.
While that can also display conceal why the group has obtained less consideration than most important ransomware producers, researchers acknowledged its technical come deserves shut monitoring.
Community-IB warned that although DeadLock stays tiny, its technique shall be copied by extra established cybercriminal groups.
No Polygon vulnerability interesting
The researchers wired that DeadLock is now not any longer exploiting any vulnerability in Polygon itself.
It is additionally no longer attacking third-celebration super contracts akin to decentralised finance protocols, wallets, or bridges.
As every other, the attackers are abusing the public and immutable nature of blockchain recordsdata to conceal configuration recordsdata.
Community-IB in contrast the technique to earlier “EtherHiding” approaches, where criminals dilapidated blockchain networks to distribute malicious configuration recordsdata.
Plenty of super contracts connected to the campaign were deployed or updated between August and Nov. 2025, per the agency’s prognosis.
Researchers acknowledged the mumble stays restricted for now, nonetheless the idea that will be reused in lots of various kinds by various menace actors.
While Polygon customers and builders are no longer going via speak possibility from this particular campaign, Community-IB acknowledged the case is one other reminder that public blockchains would be misused to enhance off-chain felony mumble in ways that are complicated to detect and dismantle.

