The ransomware family’s abuse of Polygon smart contracts echoes techniques recently seen in Ethereum-based attacks.
While ‘traditional’ ransomware attacks remain stable, some gangs are shifting towards exploiting zero-days and supply chains to go straight to stealing data ...
Cybersecurity researchers are becoming interested in a newly discovered ransomware strain called DeadLock that abuses Polygon ...
Group-IB warned about a new ransomware strain, DeadLock, using Polygon smart contracts for proxy server rotation. The malware ...
But for the researchers at Group-IB, the old-school encryption-only model is not the most notable aspect of the DeadLock ...
The Games in the Italian Alps are attracting hacktivists looking to reach billions of people and state-sponsored cyber-spies ...
A recently-discovered ransomware dubbed “DeadLock” is stealthily exploiting Polygon smart contracts to rotate and distribute ...
Discover how crypto malware operates through cryptojacking and ransomware, with real-world examples such as WannaMine and PowerGhost ...
Abstract "Double-extortion" ransomware attacks not only encrypt systems but also steal sensitive data. Traditional backups ...
University of Hawaii says a ransomware gang breached its Cancer Center in August 2025, stealing data of study participants, ...
New research from Trellix detailed that CrazyHunter ransomware has emerged as a serious and escalating threat, underscoring the growing sophistication of modern cybercriminal operations.
We’re pleased to collaborate with Elastio to strengthen data recovery assurance. Together, we are helping enterprises ...