{"id":16862,"date":"2026-01-15T15:44:08","date_gmt":"2026-01-15T15:44:08","guid":{"rendered":"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/"},"modified":"2026-01-15T15:44:08","modified_gmt":"2026-01-15T15:44:08","slug":"deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas","status":"publish","type":"post","link":"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/","title":{"rendered":"DeadLock Ransomware: Paggamit ng Polygon Smart Contracts para Makaiwas sa Pagtuklas"},"content":{"rendered":"<h2>Bagong Uri ng Ransomware: DeadLock<\/h2>\n<p>Isang bagong uri ng <strong>ransomware<\/strong> ang natuklasan na gumagamit ng <strong>Polygon smart contracts<\/strong> para sa pag-ikot at pamamahagi ng proxy server address upang makapasok sa mga device. Ayon sa babala ng cybersecurity firm na <strong>Group-IB<\/strong> noong Huwebes, ang malware na tinatawag na <strong>DeadLock<\/strong> ay unang natukoy noong Hulyo 2025. Sa ngayon, ito ay nakakuha ng kaunting atensyon dahil sa kakulangan ng pampublikong affiliate program at data-leak site, at nakapinsala lamang sa limitadong bilang ng mga biktima.<\/p>\n<blockquote>\n<p>&#8220;Bagaman ito ay mababa ang profile at mababang epekto, gumagamit ito ng mga makabagong pamamaraan na nagpapakita ng umuunlad na kasanayan na maaaring maging mapanganib kung ang mga organisasyon ay hindi seryosohin ang umuusbong na banta na ito,&#8221; sabi ng Group-IB sa isang blog.<\/p>\n<\/blockquote>\n<h2>Paggamit ng Smart Contracts<\/h2>\n<p>Ang paggamit ng DeadLock ng smart contracts upang maghatid ng proxy addresses ay isang kawili-wiling pamamaraan kung saan ang mga umaatake ay literal na makakapag-apply ng <strong>walang katapusang mga variant<\/strong> ng teknik na ito; ang imahinasyon ang hangganan, ayon sa kumpanya. Itinuro ng Group-IB ang isang kamakailang ulat mula sa <strong>Google Threat Intelligence Group<\/strong> na nagha-highlight ng paggamit ng katulad na teknik na tinatawag na <strong>&#8220;EtherHiding&#8221;<\/strong> na ginamit ng mga hacker mula sa North Korea. Ang EtherHiding ay isang kampanya na inihayag noong nakaraang taon kung saan ginamit ng mga hacker ng DPRK ang <strong>Ethereum blockchain<\/strong> upang itago at ihatid ang nakakapinsalang software.<\/p>\n<h2>Mga Paraan ng Pag-atake<\/h2>\n<p>Karaniwang nahihikayat ang mga biktima sa pamamagitan ng mga <strong>compromised na website<\/strong>\u2014madalas na mga pahina ng WordPress\u2014na naglo-load ng isang maliit na snippet ng JavaScript. Ang code na iyon ay kumukuha ng nakatagong payload mula sa blockchain, na nagpapahintulot sa mga umaatake na ipamahagi ang malware sa isang paraan na lubos na matibay laban sa mga pag-alis. Parehong ang EtherHiding at DeadLock ay muling ginagamit ang mga pampublikong, desentralisadong ledger bilang mga nakatagong channel na mahirap para sa mga tagapagtanggol na harangan o buwagin.<\/p>\n<h2>Mga Katangian ng DeadLock<\/h2>\n<p>Ang DeadLock ay gumagamit ng mga <strong>rotating proxies<\/strong>, na mga server na regular na nagbabago ng IP ng isang gumagamit, na nagpapahirap sa pagsubaybay o pagharang. Habang inamin ng Group-IB na &#8220;ang mga paunang access vectors at iba pang mahahalagang yugto ng mga pag-atake ay nananatiling hindi alam sa puntong ito,&#8221; sinabi nito na ang mga impeksyon ng DeadLock ay nire-renamed ang mga encrypted na file na may <strong>&#8220;.dlock&#8221;<\/strong> na extension at pinapalitan ang mga background ng desktop ng mga ransom note. Ang mga mas bagong bersyon ay nagbabala rin sa mga biktima na ang sensitibong data ay ninakaw at maaaring ibenta o ma-leak kung hindi mababayaran ang ransom.<\/p>\n<h2>Mga Variant ng Malware<\/h2>\n<p>Hindi bababa sa tatlong variant ng malware ang natukoy sa ngayon. Ang mga naunang bersyon ay umaasa sa mga diumano&#8217;y compromised na server, ngunit ngayon ay naniniwala ang mga mananaliksik na ang grupo ay nagpapatakbo ng sarili nitong imprastruktura. Ang pangunahing inobasyon, gayunpaman, ay nasa kung paano kinukuha at pinamamahalaan ng DeadLock ang mga address ng server. <strong>Nakatuklas ang mga mananaliksik ng Group-IB<\/strong> ng JS code sa loob ng HTML file na nakikipag-ugnayan sa isang smart contract sa ibabaw ng Polygon network. &#8220;Ang RPC list na ito ay naglalaman ng mga available na endpoints para sa pakikipag-ugnayan sa Polygon network o blockchain, na nagsisilbing mga gateway na nag-uugnay sa mga aplikasyon sa umiiral na mga node ng blockchain.&#8221;<\/p>\n<h2>Komunikasyon sa mga Biktima<\/h2>\n<p>Ang pinakabagong bersyon na naobserbahan ay nag-embed din ng mga channel ng komunikasyon sa pagitan ng biktima at umaatake. Ang DeadLock ay naglalabas ng isang HTML file na nagsisilbing wrapper sa paligid ng encrypted messaging app na <strong>Session<\/strong>. &#8220;Ang pangunahing layunin ng HTML file ay upang mapadali ang direktang komunikasyon sa pagitan ng operator ng DeadLock at ng biktima,&#8221; sabi ng Group-IB.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bagong Uri ng Ransomware: DeadLock Isang bagong uri ng ransomware ang natuklasan na gumagamit ng Polygon smart contracts para sa pag-ikot at pamamahagi ng proxy server address upang makapasok sa mga device. Ayon sa babal&#8230;<\/p>\n","protected":false},"author":3,"featured_media":16861,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[7553,4218,5247,4313,4294],"class_list":["post-16862","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hack","tag-dprk","tag-ethereum","tag-google","tag-hack","tag-polygon"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DeadLock Ransomware: Paggamit ng Polygon Smart Contracts para Makaiwas sa Pagtuklas - CryptoZen<\/title>\n<meta name=\"description\" content=\"Tuklasin kung paano ginagamit ng DeadLock ransomware ang Polygon smart contracts para makaiwas sa pagtuklas, na nagpapakita ng mga makabago ngunit nakababahalang teknik ng cyberattack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DeadLock Ransomware: Paggamit ng Polygon Smart Contracts para Makaiwas sa Pagtuklas - CryptoZen\" \/>\n<meta property=\"og:description\" content=\"Tuklasin kung paano ginagamit ng DeadLock ransomware ang Polygon smart contracts para makaiwas sa pagtuklas, na nagpapakita ng mga makabago ngunit nakababahalang teknik ng cyberattack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/\" \/>\n<meta property=\"og:site_name\" content=\"CryptoZen\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-15T15:44:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_153046_preview.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/\"},\"author\":{\"name\":\"Editor\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/#\/schema\/person\/215c42a44c778a4d41cede868d63707c\"},\"headline\":\"DeadLock Ransomware: Paggamit ng Polygon Smart Contracts para Makaiwas sa Pagtuklas\",\"datePublished\":\"2026-01-15T15:44:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/\"},\"wordCount\":634,\"publisher\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/#organization\"},\"image\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_153046_preview.jpeg\",\"keywords\":[\"DPRK\",\"Ethereum\",\"Google\",\"Hack\",\"Polygon\"],\"articleSection\":[\"Hack\"],\"inLanguage\":\"tl\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/\",\"url\":\"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/\",\"name\":\"DeadLock Ransomware: Paggamit ng Polygon Smart Contracts para Makaiwas sa Pagtuklas - CryptoZen\",\"isPartOf\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_153046_preview.jpeg\",\"datePublished\":\"2026-01-15T15:44:08+00:00\",\"description\":\"Tuklasin kung paano ginagamit ng DeadLock ransomware ang Polygon smart contracts para makaiwas sa pagtuklas, na nagpapakita ng mga makabago ngunit nakababahalang teknik ng cyberattack.\",\"breadcrumb\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/#breadcrumb\"},\"inLanguage\":\"tl\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tl\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/#primaryimage\",\"url\":\"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_153046_preview.jpeg\",\"contentUrl\":\"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_153046_preview.jpeg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cryptozen.asia\/ph\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DeadLock Ransomware: Paggamit ng Polygon Smart Contracts para Makaiwas sa Pagtuklas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/#website\",\"url\":\"https:\/\/cryptozen.asia\/ph\/\",\"name\":\"CryptoZen\",\"description\":\"Nangungunang Balita sa Cryptocurrency na Pinalakas ng AI\",\"publisher\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/#organization\"},\"alternateName\":\"CZ\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cryptozen.asia\/ph\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tl\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/#organization\",\"name\":\"CryptoZen\",\"alternateName\":\"CZ\",\"url\":\"https:\/\/cryptozen.asia\/ph\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tl\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2025\/05\/azen_preview2-1.png\",\"contentUrl\":\"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2025\/05\/azen_preview2-1.png\",\"width\":600,\"height\":600,\"caption\":\"CryptoZen\"},\"image\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/#\/schema\/person\/215c42a44c778a4d41cede868d63707c\",\"name\":\"Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tl\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bfd406270e6dbea874497e5c3a864e82?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bfd406270e6dbea874497e5c3a864e82?s=96&d=mm&r=g\",\"caption\":\"Editor\"},\"url\":\"https:\/\/cryptozen.asia\/ph\/author\/editorapi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DeadLock Ransomware: Paggamit ng Polygon Smart Contracts para Makaiwas sa Pagtuklas - CryptoZen","description":"Tuklasin kung paano ginagamit ng DeadLock ransomware ang Polygon smart contracts para makaiwas sa pagtuklas, na nagpapakita ng mga makabago ngunit nakababahalang teknik ng cyberattack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/","og_locale":"en_US","og_type":"article","og_title":"DeadLock Ransomware: Paggamit ng Polygon Smart Contracts para Makaiwas sa Pagtuklas - CryptoZen","og_description":"Tuklasin kung paano ginagamit ng DeadLock ransomware ang Polygon smart contracts para makaiwas sa pagtuklas, na nagpapakita ng mga makabago ngunit nakababahalang teknik ng cyberattack.","og_url":"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/","og_site_name":"CryptoZen","article_published_time":"2026-01-15T15:44:08+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_153046_preview.jpeg","type":"image\/jpeg"}],"author":"Editor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Editor","Est. reading time":"3 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/#article","isPartOf":{"@id":"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/"},"author":{"name":"Editor","@id":"https:\/\/cryptozen.asia\/ph\/#\/schema\/person\/215c42a44c778a4d41cede868d63707c"},"headline":"DeadLock Ransomware: Paggamit ng Polygon Smart Contracts para Makaiwas sa Pagtuklas","datePublished":"2026-01-15T15:44:08+00:00","mainEntityOfPage":{"@id":"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/"},"wordCount":634,"publisher":{"@id":"https:\/\/cryptozen.asia\/ph\/#organization"},"image":{"@id":"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/#primaryimage"},"thumbnailUrl":"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_153046_preview.jpeg","keywords":["DPRK","Ethereum","Google","Hack","Polygon"],"articleSection":["Hack"],"inLanguage":"tl"},{"@type":"WebPage","@id":"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/","url":"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/","name":"DeadLock Ransomware: Paggamit ng Polygon Smart Contracts para Makaiwas sa Pagtuklas - CryptoZen","isPartOf":{"@id":"https:\/\/cryptozen.asia\/ph\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/#primaryimage"},"image":{"@id":"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/#primaryimage"},"thumbnailUrl":"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_153046_preview.jpeg","datePublished":"2026-01-15T15:44:08+00:00","description":"Tuklasin kung paano ginagamit ng DeadLock ransomware ang Polygon smart contracts para makaiwas sa pagtuklas, na nagpapakita ng mga makabago ngunit nakababahalang teknik ng cyberattack.","breadcrumb":{"@id":"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/#breadcrumb"},"inLanguage":"tl","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/"]}]},{"@type":"ImageObject","inLanguage":"tl","@id":"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/#primaryimage","url":"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_153046_preview.jpeg","contentUrl":"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_153046_preview.jpeg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/cryptozen.asia\/ph\/deadlock-ransomware-paggamit-ng-polygon-smart-contracts-para-makaiwas-sa-pagtuklas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cryptozen.asia\/ph\/"},{"@type":"ListItem","position":2,"name":"DeadLock Ransomware: Paggamit ng Polygon Smart Contracts para Makaiwas sa Pagtuklas"}]},{"@type":"WebSite","@id":"https:\/\/cryptozen.asia\/ph\/#website","url":"https:\/\/cryptozen.asia\/ph\/","name":"CryptoZen","description":"Nangungunang Balita sa Cryptocurrency na Pinalakas ng AI","publisher":{"@id":"https:\/\/cryptozen.asia\/ph\/#organization"},"alternateName":"CZ","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cryptozen.asia\/ph\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tl"},{"@type":"Organization","@id":"https:\/\/cryptozen.asia\/ph\/#organization","name":"CryptoZen","alternateName":"CZ","url":"https:\/\/cryptozen.asia\/ph\/","logo":{"@type":"ImageObject","inLanguage":"tl","@id":"https:\/\/cryptozen.asia\/ph\/#\/schema\/logo\/image\/","url":"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2025\/05\/azen_preview2-1.png","contentUrl":"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2025\/05\/azen_preview2-1.png","width":600,"height":600,"caption":"CryptoZen"},"image":{"@id":"https:\/\/cryptozen.asia\/ph\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cryptozen.asia\/ph\/#\/schema\/person\/215c42a44c778a4d41cede868d63707c","name":"Editor","image":{"@type":"ImageObject","inLanguage":"tl","@id":"https:\/\/cryptozen.asia\/ph\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bfd406270e6dbea874497e5c3a864e82?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfd406270e6dbea874497e5c3a864e82?s=96&d=mm&r=g","caption":"Editor"},"url":"https:\/\/cryptozen.asia\/ph\/author\/editorapi\/"}]}},"yoast_description":"Tuklasin kung paano ginagamit ng DeadLock ransomware ang Polygon smart contracts para makaiwas sa pagtuklas, na nagpapakita ng mga makabago ngunit nakababahalang teknik ng cyberattack.","_links":{"self":[{"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/posts\/16862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/comments?post=16862"}],"version-history":[{"count":0,"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/posts\/16862\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/media\/16861"}],"wp:attachment":[{"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/media?parent=16862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/categories?post=16862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/tags?post=16862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}