DeadLock Ransomware Campaign Uses BYOVD to Evade Security Tools
Summary
Hide ▲
Show ▼
A financially motivated threat actor has been observed deploying DeadLock ransomware using a Bring Your Own Vulnerable Driver (BYOVD) technique to disable endpoint detection tools and achieve full system compromise. The attack involved privilege-escalation scripts, registry modifications, remote access tools (RATs), and a custom encryption routine. The ransomware targeted various applications and services while avoiding critical system files to maintain system functionality for ransom negotiations. Victims were instructed to pay ransom in Bitcoin or Monero via Session Messenger. The latest DeadLock samples observed by Group-IB include an HTML file used to communicate with victims through the Session encrypted messaging platform. Instead of relying on hard-coded servers, the malware retrieves proxy addresses stored inside a Polygon smart contract. This approach uses read-only calls that do not generate transactions or incur network fees, complicating traditional blocking approaches. The JavaScript code within the calls queries a specific Polygon smart contract to obtain the current proxy URL, which then relays encrypted messages between the victim and the attacker’s Session ID.
Timeline
-
14.01.2026 16:20 1 articles · 23h ago
DeadLock Uses Polygon Smart Contracts for Proxy Rotation
DeadLock ransomware uses Polygon blockchain smart contracts to manage and rotate proxy server addresses. The malware retrieves proxy addresses stored inside a Polygon smart contract through read-only calls, which do not generate transactions or incur network fees. This approach complicates traditional blocking methods. The JavaScript code queries a specific Polygon smart contract to obtain the current proxy URL, which relays encrypted messages between the victim and the attacker’s Session ID.
Show sources
- DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation — www.infosecurity-magazine.com — 14.01.2026 16:20
-
09.12.2025 18:00 2 articles · 1mo ago
DeadLock Ransomware Campaign Uses BYOVD to Evade Security Tools
A threat actor deployed DeadLock ransomware using a Bring Your Own Vulnerable Driver (BYOVD) technique to disable endpoint detection tools. The attack involved privilege-escalation scripts, registry modifications, remote access tools (RATs), and a custom encryption routine. The ransomware targeted various applications and services while avoiding critical system files to maintain system functionality. Victims were instructed to pay ransom in Bitcoin or Monero via Session Messenger.
Show sources
- DeadLock Ransomware Uses BYOVD to Evade Security Measures — www.infosecurity-magazine.com — 09.12.2025 18:00
- DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation — www.infosecurity-magazine.com — 14.01.2026 16:20
Information Snippets
-
The attack exploited a flaw in a Baidu Antivirus driver, tracked as CVE-2024-51324, to terminate security processes.
First reported: 09.12.2025 18:001 source, 2 articlesShow sources
- DeadLock Ransomware Uses BYOVD to Evade Security Measures — www.infosecurity-magazine.com — 09.12.2025 18:00
- DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation — www.infosecurity-magazine.com — 14.01.2026 16:20
-
A custom loader initiated the vulnerable driver, located targeted endpoint detection services, and issued kernel-level commands to kill them.
First reported: 09.12.2025 18:001 source, 2 articlesShow sources
- DeadLock Ransomware Uses BYOVD to Evade Security Measures — www.infosecurity-magazine.com — 09.12.2025 18:00
- DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation — www.infosecurity-magazine.com — 14.01.2026 16:20
-
The DeadLock payload was compiled in July 2025 and written in C++. It dropped an embedded batch script to set up the environment and injected itself into rundll32.exe via process hollowing.
First reported: 09.12.2025 18:001 source, 2 articlesShow sources
- DeadLock Ransomware Uses BYOVD to Evade Security Measures — www.infosecurity-magazine.com — 09.12.2025 18:00
- DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation — www.infosecurity-magazine.com — 14.01.2026 16:20
-
The ransomware used a custom stream cipher to encrypt files, generating time-based keys and processing file contents in memory.
First reported: 09.12.2025 18:001 source, 2 articlesShow sources
- DeadLock Ransomware Uses BYOVD to Evade Security Measures — www.infosecurity-magazine.com — 09.12.2025 18:00
- DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation — www.infosecurity-magazine.com — 14.01.2026 16:20
-
The ransomware waited approximately 50 seconds to evade sandbox detection before launching encryption.
First reported: 09.12.2025 18:001 source, 2 articlesShow sources
- DeadLock Ransomware Uses BYOVD to Evade Security Measures — www.infosecurity-magazine.com — 09.12.2025 18:00
- DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation — www.infosecurity-magazine.com — 14.01.2026 16:20
-
Victims received a detailed ransom note promising "military-grade encryption" and outlining a six-step recovery process.
First reported: 09.12.2025 18:001 source, 2 articlesShow sources
- DeadLock Ransomware Uses BYOVD to Evade Security Measures — www.infosecurity-magazine.com — 09.12.2025 18:00
- DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation — www.infosecurity-magazine.com — 14.01.2026 16:20
-
Communication with victims occurred exclusively through Session Messenger, leveraging its end-to-end encryption (E2EE) and anonymity features.
First reported: 09.12.2025 18:001 source, 2 articlesShow sources
- DeadLock Ransomware Uses BYOVD to Evade Security Measures — www.infosecurity-magazine.com — 09.12.2025 18:00
- DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation — www.infosecurity-magazine.com — 14.01.2026 16:20
-
DeadLock ransomware uses Polygon blockchain smart contracts to manage and rotate proxy server addresses.
First reported: 14.01.2026 16:201 source, 1 articleShow sources
- DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation — www.infosecurity-magazine.com — 14.01.2026 16:20
-
The malware retrieves proxy addresses stored inside a Polygon smart contract through read-only calls.
First reported: 14.01.2026 16:201 source, 1 articleShow sources
- DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation — www.infosecurity-magazine.com — 14.01.2026 16:20
-
DeadLock uses AnyDesk as a remote management tool and deploys PowerShell scripts to stop services and delete shadow copies.
First reported: 14.01.2026 16:201 source, 1 articleShow sources
- DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation — www.infosecurity-magazine.com — 14.01.2026 16:20
-
Victims' files are renamed with a .dlock extension, and ransom notes threaten to sell stolen data if payment is not made.
First reported: 14.01.2026 16:201 source, 1 articleShow sources
- DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation — www.infosecurity-magazine.com — 14.01.2026 16:20
Similar Happenings
CyberVolk's VolkLocker ransomware flaw allows free decryption
CyberVolk, a pro-Russia hacktivist group, launched VolkLocker ransomware-as-a-service (RaaS) with a critical cryptographic flaw. The ransomware uses a hardcoded master key stored in plaintext, enabling victims to decrypt files without paying the ransom. VolkLocker targets both Linux/VMware ESXi and Windows systems and includes a timer function that wipes user folders if the ransom is not paid. The group also offers a remote access trojan and a keylogger for sale. The flaw in VolkLocker's cryptography was discovered by SentinelOne researchers, who noted that the master key is written to a plaintext file in the %TEMP% folder, allowing victims to recover their files. This weakness undermines the ransomware's effectiveness and highlights the group's inexperience in cybercrime operations. VolkLocker is written in Golang and attempts to escalate privileges and perform reconnaissance and system enumeration. It makes Windows Registry modifications to thwart recovery and analysis, deletes volume shadow copies, and terminates processes associated with Microsoft Defender Antivirus and other common analysis tools. The ransomware uses an enforcement timer that wipes the content of user folders if victims fail to pay within 48 hours or enter the wrong decryption key three times. VolkLocker payloads come with built-in Telegram automation for command-and-control, allowing users to message victims, initiate file decryption, list active victims, and get system information.
Velociraptor DFIR Tool Abused in LockBit and Babuk Ransomware Campaigns
Threat actors, assessed to be China-based Storm-2603, have started using the Velociraptor digital forensics and incident response (DFIR) tool in ransomware attacks deploying LockBit and Babuk ransomware. The attackers exploited a privilege escalation vulnerability in an outdated version of Velociraptor to gain persistent access and control over virtual machines. The campaign involved creating local admin accounts, disabling security features, and using fileless PowerShell encryptors for data exfiltration and encryption. The ransomware deployed on Windows systems was identified as LockBit, while a Linux binary detected as Babuk ransomware was found on VMware ESXi systems. Storm-2603 initially exploited SharePoint vulnerabilities in July 2025 and deployed Warlock, LockBit, and Babuk ransomware on VMware ESXi servers in August 2025. Sophos CTU researchers first documented Velociraptor abuse by Storm-2603 on August 5, 2025. Storm-2603 used the ToolShell exploit to gain initial access and deployed an outdated version of Velociraptor (version 0.73.4.0) that is susceptible to a privilege escalation vulnerability (CVE-2025-6264) to enable arbitrary command execution and endpoint takeover. The group also used Smbexec to remotely launch programs using the SMB protocol and modified Active Directory (AD) Group Policy Objects (GPOs) to disable real-time protection. Storm-2603 established the infrastructure for the AK47 C2 framework in March 2025 and created the first prototype of the tool the next month. The group pivoted from LockBit-only deployment to dual LockBit/Warlock deployment in April 2025 and used the ToolShell exploit as a zero-day in July 2025. Storm-2603 demonstrated operational flexibility and sophisticated builder expertise using leaked and open-source ransomware frameworks.
LockBit, Qilin, and DragonForce Form Ransomware Alliance
LockBit, Qilin, and DragonForce have formed a strategic alliance to enhance their ransomware operations. This collaboration aims to share techniques, resources, and infrastructure, potentially increasing the threat to critical infrastructure and expanding the attack surface to previously low-risk sectors. LockBit has returned to active operations with new victims identified in September 2025, marking a significant comeback over a year after Operation Cronos disrupted its infrastructure. The alliance comes as LockBit returns to the scene following a significant law enforcement operation in early 2024, which disrupted its infrastructure and led to the arrest of some of its members. Qilin has been the most active ransomware group in recent months, targeting North America-based organizations disproportionately. The partnership is expected to bolster LockBit's reputation among affiliates and facilitate a surge in attacks.
UNC5518 Access-as-a-Service Campaign via ClickFix and Fake CAPTCHA Pages
The ClickFix malware campaign has evolved to include multi-OS support and video tutorials that guide victims through the self-infection process. The campaign, which uses fake Cloudflare CAPTCHA pages and malicious PowerShell scripts, has been observed deploying various payloads, including information stealers and backdoors. The FileFix attack, a variant of the ClickFix family, impersonates Meta account suspension warnings to trick users into installing the StealC infostealer malware. The campaign has evolved over two weeks with different payloads, domains, and lures, indicating an attacker testing and adapting their infrastructure. The FileFix technique, created by red team researcher mr. d0x, uses the address bar in File Explorer to execute malicious commands. The campaign employs steganography to hide a second-stage PowerShell script and encrypted executables inside a JPG image, which is believed to be AI-generated. The StealC malware targets credentials from various applications, cryptocurrency wallets, and cloud services, and can take screenshots of the active desktop. The FileFix attack uses a multilingual phishing site to trick users into executing a malicious command via the File Explorer address bar. The attack leverages Bitbucket to host the malicious components, abusing a legitimate source code hosting platform to bypass detection. The attack involves a multi-stage PowerShell script that downloads an image, decodes it into the next-stage payload, and runs a Go-based loader to launch StealC. The attack uses advanced obfuscation techniques, including junk code and fragmentation, to hinder analysis efforts. The FileFix attack is more likely to be detected by security products due to the payload being executed by the web browser used by the victim. The FileFix attack demonstrates significant investment in tradecraft, with carefully engineered phishing infrastructure, payload delivery, and supporting elements to maximize evasion and impact. The MetaStealer attack, a variant of the ClickFix family, uses a fake Cloudflare Turnstile lure and an MSI package disguised as a PDF to deploy the MetaStealer infostealer malware. The attack involves a multi-stage infection chain that includes a DLL sideloading technique using a legitimate SentinelOne executable. The MetaStealer attack targets crypto wallets and other sensitive information, using a combination of social engineering and technical evasion techniques to deploy malware. Recently, threat actors have been abusing the decades-old Finger protocol to retrieve and execute remote commands on Windows devices. The Finger protocol is used to deliver commands that create a random-named path, download a zip archive disguised as a PDF, and extract a Python malware package. The Python program is executed using pythonw.exe __init__.py, and a callback is made to the attacker's server to confirm execution. A related batch file indicates that the Python package is an infostealer. Another campaign uses the Finger protocol to retrieve and run commands that look for malware research tools and exit if found. If no malware analysis tools are found, the commands download a zip archive disguised as PDF files and extract the NetSupport Manager RAT package. The commands configure a scheduled task to launch the remote access malware when the user logs in. The Finger protocol abuse appears to be carried out by a single threat actor conducting ClickFix attacks. A new EVALUSION ClickFix campaign has been discovered, delivering Amatera Stealer and NetSupport RAT. Amatera Stealer, an evolution of ACR Stealer, is available under a malware-as-a-service (MaaS) model and targets crypto-wallets, browsers, messaging applications, FTP clients, and email services. It employs advanced evasion techniques such as WoW64 SysCalls and is packed using PureCrypter. The stealer is injected into the MSBuild.exe process to harvest sensitive data and contact an external server to execute a PowerShell command to fetch and run NetSupport RAT. The campaign also involves phishing attacks using various malware families and phishing kits named Cephas and Tycoon 2FA. Tycoon 2FA is a phishing kit that bypasses multi-factor authentication (MFA) and authentication apps by intercepting usernames, passwords, session cookies, and MFA flows in real-time. It has been used in over 64,000 attacks this year, primarily targeting Microsoft 365 and Gmail. Tycoon 2FA includes anti-detection layers and can lead to total session takeover, allowing attackers to move laterally into various enterprise systems. Legacy MFA methods are vulnerable to Tycoon 2FA, and phishing-proof MFA solutions like Token Ring and Token BioStick are recommended to prevent such attacks. A new operation embedding StealC V2 inside Blender project files has been observed targeting victims for at least six months. The attackers placed manipulated .blend files on platforms such as CGTrader, where users downloaded them as routine 3D assets. When opened with Blender’s Auto Run feature enabled, the files executed concealed Python scripts that launched a multistage infection. The infection chain began with a tampered Rig_Ui.py script embedded inside the .blend file. This script fetched a loader from a remote workers.dev domain, which then downloaded a PowerShell stage and two ZIP archives containing Python-based stealers. Once extracted into the Windows temp directory, the malware created LNK files to secure persistence, then used Pyramid C2 channels to retrieve encrypted payloads. StealC V2, promoted on underground forums since April 2025, has rapidly expanded its feature set. It now targets more than 23 browsers, over 100 plugins, more than 15 desktop wallets, and a range of messaging, VPN and mail clients. Its pricing, from $200 per month to $800 for 6 months, has made it accessible to low-tier cybercriminals seeking ready-to-use tools. ClickFix attack variants have been observed using a realistic-looking Windows Update animation in a full-screen browser page to trick users into executing malicious commands. The new ClickFix variants drop the LummaC2 and Rhadamanthys information stealers. The attack uses steganography to encode the final malware payload inside an image. The process involves multiple stages that use PowerShell code and a .NET assembly (the Stego Loader) responsible for reconstructing the final payload embedded inside a PNG file in an encrypted state. The shellcode holding the infostealer samples is packed using the Donut tool. The Rhadamanthys variant that used the Windows Update lure was first spotted by researchers back in October, before Operation Endgame took down parts of its infrastructure on November 13. A new campaign codenamed JackFix leverages fake adult websites (xHamster, PornHub clones) as its phishing mechanism, likely distributed via malvertising. The JackFix campaign displays highly convincing fake Windows update screens in an attempt to get the victim to run malicious code. The attack heavily leans on obfuscation to conceal ClickFix-related code and blocks users from escaping the full-screen alert by disabling the Escape and F11 buttons, along with F5 and F12 keys. The initial command executed is an MSHTA payload that's launched using the legitimate mshta.exe binary, which contains JavaScript designed to run a PowerShell command to retrieve another PowerShell script from a remote server. The PowerShell script attempts to elevate privileges and creates Microsoft Defender Antivirus exclusions for command-and-control (C2) addresses and paths where the payloads are staged. The PowerShell script serves up to eight different payloads, including Rhadamanthys Stealer, Vidar Stealer 2.0, RedLine Stealer, Amadey, and other unspecified loaders and RATs. The threat actor often changes the URI used to host the first mshta.exe stage and has been observed moving from hosting the second stage on the domain securitysettings.live to xoiiasdpsdoasdpojas.com, although both point to the same IP address 141.98.80.175. An initial access broker tracked as Storm-0249 is abusing endpoint detection and response solutions and trusted Microsoft Windows utilities to load malware, establish communication, and persistence in preparation for ransomware attacks. The threat actor has moved beyond mass phishing and adopted stealthier, more advanced methods that prove effective and difficult for defenders to counter. In one attack analyzed by researchers at cybersecurity company ReliaQuest, Storm-0249 leveraged the SentinelOne EDR components to hide malicious activity. The attack started with ClickFix social engineering that tricked users into pasting and executing curl commands in the Windows Run dialog to download a malicious MSI package with SYSTEM privileges. A malicious PowerShell script is also fetched from a spoofed Microsoft domain, which is piped straight onto the system's memory, never touching the disk and thus evading antivirus detection. The MSI file drops a malicious DLL (SentinelAgentCore.dll), which is placed strategically alongside the pre-existing, legitimate SentinelAgentWorker.exe, which is already installed as part of the victim's SentinelOne EDR. Next, the attacker loads the DLL using the signed SentinelAgentWorker (DLL sideloading), executing the file within the trusted, privileged EDR process and obtaining stealthy persistence that survives operating system updates. Once the attacker gains access, they use the SentinelOne component to collect system identifiers through legitimate Windows utilities like reg.exe and findstr.exe, and to funnel encrypted HTTPS command-and-control (C2) traffic. The compromised systems are profiled using 'MachineGuid,' a unique hardware-based identifier that ransomware groups like LockBit and ALPHV use for binding encryption keys to specific victims. The abuse of trusted, signed EDR processes bypasses nearly all traditional monitoring. The researchers recommend that system administrators rely on behavior-based detection that identifies trusted processes loading unsigned DLLs from non-standard paths. Furthermore, it is helpful to set stricter controls for curl, PowerShell, and LoLBin execution. A new variation of the ClickFix attack dubbed 'ConsentFix' abuses the Azure CLI OAuth app to hijack Microsoft accounts without the need for a password or to bypass multi-factor authentication (MFA) verifications. ConsentFix tricks victims into completing the Azure CLI OAuth flow and steals the resulting authorization code, which is exchanged for full account access. The attack starts with victims landing on a compromised, legitimate website that ranks high on Google Search results. Victims are shown a fake Cloudflare Turnstile CAPTCHA widget that asks for a valid business email address, filtering out bots and non-targets. Victims are instructed to click a 'Sign in' button that opens a legitimate Microsoft URL in a new tab, leading to an Azure login page. The attack completes when victims paste the URL containing the Azure CLI OAuth authorization code into the malicious page, granting attackers access to the Microsoft account via Azure CLI. The attack triggers only once per victim IP address, preventing repeated phishing attempts on the same IP. Defenders are advised to monitor for unusual Azure CLI login activity, such as logins from new IP addresses, and to check for legacy Graph scopes used by attackers to evade detection. Over the past six months, hackers have increasingly relied on the browser-in-the-browser (BitB) method to trick users into providing Facebook account credentials. The BitB phishing technique was developed by security researcher mr.d0x in 2022. In a BitB attack, users who visit attacker-controlled webpages are presented with a fake browser pop-up containing a login form. The pop-up is implemented using an iframe that imitates the authentication interface of legitimate platforms and can be customized with a window title and URL that make the deception more difficult to detect. Recent phishing campaigns targeting Facebook users impersonate law firms claiming copyright infringement, threatening imminent account suspension, or Meta security notifications about unauthorized logins. To avoid detection and to increase the sense of legitimacy, cybercriminals added shortened URLs and fake Meta CAPTCHA pages. In the final stage of the attack, victims are prompted to log in by entering their Facebook credentials in a fake pop-up window. Trellix discovered a high number of phishing pages hosted on legitimate cloud platforms like Netlify and Vercel, which mimic Meta's Privacy Center portal, redirecting users to pages disguised as appeal forms that collected personal information. These campaigns constitute a significant evolution compared to standard Facebook phishing campaigns that security researchers typically observe. The key shift lies in the abuse of trusted infrastructure, utilizing legitimate cloud hosting services like Netlify and Vercel, and URL shorteners to bypass traditional security filters and lend a false sense of security to phishing pages. Most critically, the emergence of the Browser-in-the-Browser (BitB) technique represents a major escalation. By creating a custom-built, fake login pop-up window within the victim's browser, this method capitalizes on user familiarity with authentication flows, making credential theft nearly impossible to detect visually.