DeadLock ransomware relies on Polygon smart contracts to spin proxy servers to produce a nearly unshuttable infrastructure.
Cybersecurity researchers are becoming interested in a newly discovered ransomware strain called DeadLock that abuses Polygon smart contracts to silently service its infrastructure and bypass ...
New research from Trellix detailed that CrazyHunter ransomware has emerged as a serious and escalating threat, underscoring the growing sophistication of modern cybercriminal operations.
But for the researchers at Group-IB, the old-school encryption-only model is not the most notable aspect of the DeadLock ...
Abstract "Double-extortion" ransomware attacks not only encrypt systems but also steal sensitive data. Traditional backups ...
DeadLock, a ransomware group that first emerged in July 2025, has made news again, and this time it is for abusing Polygon ...
Cyber extortion, by contrast, now encompasses a much broader set of coercive tactics, including data theft and leak threats, ...
While ‘traditional’ ransomware attacks remain stable, some gangs are shifting towards exploiting zero-days and supply chains to go straight to stealing data ...
Security researchers are warning of a new strain of the Locky ransomware — the malware responsible for crippling networks at Methodist Hospital in Henderson, Ky., and King’s Daughters’ Health in ...
SSE-C stands (well, stood) for “Server Side Encryption- Customer-provided keys”. It allowed you to provide an encryption key ...
When ransomware strikes, most organizations spring into action as if they’re responding to a classic crime scene: Tape off the perimeter, start the restoration process, and try to regain access to ...