Beware of DeadLock Ransomware: How to Use Polygon Smart Contracts to Avoid Disruption

robot
Abstract generation in progress

【ChainNews】The cybersecurity research team recently exposed a cunning threat—DeadLock ransomware is abusing Polygon smart contracts to evade tracking. This malware has been active since last summer. What is its core method? It dynamically calls on-chain smart contracts to update command and control server addresses, making it impossible to lock down the victim’s communication channels.

The infection process is straightforward: after data is encrypted, DeadLock issues a ransom note threatening victims—pay up or have the stolen information publicly sold. This tactic may seem old-fashioned, but the issue lies in the way the infrastructure is hidden. Traditional C2 servers for ransomware can be shut down, but DeadLock writes proxy addresses into the blockchain, with global nodes permanently storing this information, making centralized intervention nearly impossible.

This method of relaying proxy addresses through on-chain smart contracts is highly variable, making it difficult for defenders to respond. Although the current known victims of DeadLock are few and its exposure limited, it demonstrates a new approach—using decentralized infrastructure to enhance the resilience of malicious activities. For organizations with weak security awareness, this has already become a tangible threat.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 5
  • Repost
  • Share
Comment
0/400
GateUser-cff9c776vip
· 01-16 03:46
Ha, this is another side of the Web3 decentralization spirit... Permanent preservation, impossible to delete. According to economists, this is a perfect example of "negative externality." Forget it, I can't keep up. From the supply and demand curve, the cost line for security defense will only become steeper and steeper. Putting ransomware infrastructure on the blockchain is truly brilliant. Hackers now also understand the meaning of "poetry and distant places." Isn't this just Schrödinger's bull market—both innovative and deadly?
View OriginalReply0
StakoorNeverSleepsvip
· 01-16 03:45
Oh no, now Polygon has also been exploited by malicious actors... The fact that this is permanently recorded on the chain is indeed disgusting, no wonder traditional defense measures are useless.
View OriginalReply0
AirdropHunter420vip
· 01-16 03:42
Wow, now I really understand... Writing C2 on the chain for global nodes to store is indeed a brilliant move... Traditional methods are completely powerless.
View OriginalReply0
MechanicalMartelvip
· 01-16 03:41
The blockchain has been messed up by hackers... It was supposed to be decentralized, but it turned into a hide-and-seek paradise.
View OriginalReply0
StakeWhisperervip
· 01-16 03:21
Wow, this is truly a real on-chain creative crime... hiding C2 in the blockchain for permanent archiving, leaving the defense team with no way out. The traditional method of shutting down servers is completely ineffective. How disgusting is that?
View OriginalReply0
  • Pin

Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)