Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
OCRFix Botnet Trojan Uses Blockchain for Stealth Operations

OCRFix Botnet Trojan Uses Blockchain for Stealth Operations

Posted on March 2, 2026 By CWS

A newly uncovered cyber threat, known as the OCRFix botnet, is leveraging advanced tactics to build a stealthy network of compromised devices. Combining social engineering with blockchain technology, this campaign is proving difficult to detect and dismantle.

The OCRFix operation integrates ClickFix phishing strategies and a novel method called EtherHiding, which stores command instructions on a blockchain. This approach complicates traditional takedown efforts, as attacker directives are stored on a decentralized platform.

Phishing Tactics and Initial Entry

The attack begins with a fraudulent website mimicking tesseract-ocr[.]com, a deceptive version of the legitimate Tesseract OCR tool. The absence of an official website for the open-source project made it an easy target for domain impersonation.

In addition to exploiting SEO and LLM poisoning, where the ChatGPT chatbot inadvertently directed users to the malicious site, a YouTube video was also found promoting these deceptive instructions.

Cyjax analysts discovered the campaign during routine monitoring, noting that the phishing site used a fake CAPTCHA to trick users. Upon clicking ‘verify,’ a hidden PowerShell command is copied to the user’s clipboard, instructing them to paste it into Windows PowerShell under the guise of a verification step.

Malware Deployment and Infection Chain

The PowerShell command connects to a server at opsecdefcloud[.]com, downloading a harmful MSI file that initiates the malware deployment. Victims are then redirected to the legitimate Tesseract GitHub page to maintain the illusion of authenticity.

The malware unfolds in three stages, beginning with Update1.exe, which retrieves a C2 address from a BNB TestNet smart contract. It then downloads a data.zip package from attacker-controlled servers.

Subsequent stages involve setup_helper.exe establishing persistence through a scheduled task, and CfgHelper.exe acting as a bot listener, sending victim data to a control panel at ldture[.]com. Cyrillic comments in the source code suggest a possible Russian origin, though this remains speculative.

Leveraging Blockchain for Command and Control

A unique aspect of OCRFix is its use of EtherHiding for C2 communications. By embedding C2 URLs in BNB Smart Chain TestNet smart contracts, attackers evade traditional server blockades and can update URLs directly on the blockchain.

This technique, previously associated with North Korean actors, indicates wider adoption among cybercriminals. The blockchain’s immutable nature allows attackers to alter command addresses without fear of takedowns.

Organizations are advised to restrict PowerShell execution and enable script block logging to detect such obfuscations. Security training should emphasize the dangers of fake CAPTCHA prompts and pasting unknown commands. Network monitoring for public blockchain node connections is also recommended.

Stay informed by following us on Google News, LinkedIn, and X for more updates. Set CSN as a preferred source on Google for ongoing cybersecurity insights.

Cyber Security News Tags:Blockchain, BNB Smart Chain, Botnet, ClickFix, cyber threats, Cybersecurity, Cyjax, EtherHiding, Malware, network security, OCRFix, Phishing, PowerShell, tesseract OCR

Post navigation

Previous Post: OpenClaw Flaw Could Allow AI Takeover via Malicious Sites
Next Post: Chrome’s AI Assistant Vulnerability Patched to Prevent Risks

Related Posts

DarkSpectre Hackers Infected 8.8 Million Chrome, Edge, and Firefox Users with Malware DarkSpectre Hackers Infected 8.8 Million Chrome, Edge, and Firefox Users with Malware Cyber Security News
SpankRAT Threatens Windows Security with Stealth Techniques SpankRAT Threatens Windows Security with Stealth Techniques Cyber Security News
Real-Time Threat Monitoring Tool Using Sigma and YARA Rules Real-Time Threat Monitoring Tool Using Sigma and YARA Rules Cyber Security News
New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers Cyber Security News
XenServer VM Tools for Windows Vulnerability Let Attackers Execute Arbitrary Code XenServer VM Tools for Windows Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
Ivanti EPMM Vulnerabilities Threaten Global Networks Ivanti EPMM Vulnerabilities Threaten Global Networks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Mirai Variant Targets TBK DVRs with CVE-2024-3721
  • Critical FortiSandbox Flaw Exploited: Immediate Action Required
  • 6 Million FTP Servers Still Exposed in 2026, Report Reveals
  • ATHR Platform Revolutionizes Large-Scale Vishing Attacks
  • White House to Discuss AI Advancements with Anthropic CEO

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Mirai Variant Targets TBK DVRs with CVE-2024-3721
  • Critical FortiSandbox Flaw Exploited: Immediate Action Required
  • 6 Million FTP Servers Still Exposed in 2026, Report Reveals
  • ATHR Platform Revolutionizes Large-Scale Vishing Attacks
  • White House to Discuss AI Advancements with Anthropic CEO

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark