Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
OCRFix Botnet Trojan Uses Blockchain for Stealth Operations

OCRFix Botnet Trojan Uses Blockchain for Stealth Operations

Posted on March 2, 2026 By CWS

A newly uncovered cyber threat, known as the OCRFix botnet, is leveraging advanced tactics to build a stealthy network of compromised devices. Combining social engineering with blockchain technology, this campaign is proving difficult to detect and dismantle.

The OCRFix operation integrates ClickFix phishing strategies and a novel method called EtherHiding, which stores command instructions on a blockchain. This approach complicates traditional takedown efforts, as attacker directives are stored on a decentralized platform.

Phishing Tactics and Initial Entry

The attack begins with a fraudulent website mimicking tesseract-ocr[.]com, a deceptive version of the legitimate Tesseract OCR tool. The absence of an official website for the open-source project made it an easy target for domain impersonation.

In addition to exploiting SEO and LLM poisoning, where the ChatGPT chatbot inadvertently directed users to the malicious site, a YouTube video was also found promoting these deceptive instructions.

Cyjax analysts discovered the campaign during routine monitoring, noting that the phishing site used a fake CAPTCHA to trick users. Upon clicking ‘verify,’ a hidden PowerShell command is copied to the user’s clipboard, instructing them to paste it into Windows PowerShell under the guise of a verification step.

Malware Deployment and Infection Chain

The PowerShell command connects to a server at opsecdefcloud[.]com, downloading a harmful MSI file that initiates the malware deployment. Victims are then redirected to the legitimate Tesseract GitHub page to maintain the illusion of authenticity.

The malware unfolds in three stages, beginning with Update1.exe, which retrieves a C2 address from a BNB TestNet smart contract. It then downloads a data.zip package from attacker-controlled servers.

Subsequent stages involve setup_helper.exe establishing persistence through a scheduled task, and CfgHelper.exe acting as a bot listener, sending victim data to a control panel at ldture[.]com. Cyrillic comments in the source code suggest a possible Russian origin, though this remains speculative.

Leveraging Blockchain for Command and Control

A unique aspect of OCRFix is its use of EtherHiding for C2 communications. By embedding C2 URLs in BNB Smart Chain TestNet smart contracts, attackers evade traditional server blockades and can update URLs directly on the blockchain.

This technique, previously associated with North Korean actors, indicates wider adoption among cybercriminals. The blockchain’s immutable nature allows attackers to alter command addresses without fear of takedowns.

Organizations are advised to restrict PowerShell execution and enable script block logging to detect such obfuscations. Security training should emphasize the dangers of fake CAPTCHA prompts and pasting unknown commands. Network monitoring for public blockchain node connections is also recommended.

Stay informed by following us on Google News, LinkedIn, and X for more updates. Set CSN as a preferred source on Google for ongoing cybersecurity insights.

Cyber Security News Tags:Blockchain, BNB Smart Chain, Botnet, ClickFix, cyber threats, Cybersecurity, Cyjax, EtherHiding, Malware, network security, OCRFix, Phishing, PowerShell, tesseract OCR

Post navigation

Previous Post: OpenClaw Flaw Could Allow AI Takeover via Malicious Sites
Next Post: Chrome’s AI Assistant Vulnerability Patched to Prevent Risks

Related Posts

Google Warns of Cybercriminals Increasingly Attacking US Users to Steal Login Credentials Google Warns of Cybercriminals Increasingly Attacking US Users to Steal Login Credentials Cyber Security News
Threat actors Breach High Value targets like Google in Salesforce Attacks Threat actors Breach High Value targets like Google in Salesforce Attacks Cyber Security News
Cyber Group Claims Massive Data Breach at Odido Cyber Group Claims Massive Data Breach at Odido Cyber Security News
Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass Cyber Security News
New AI Malware Era Begins as Advanced VoidLink Malware Emerges as the First Fully AI-Driven Threat Framework New AI Malware Era Begins as Advanced VoidLink Malware Emerges as the First Fully AI-Driven Threat Framework Cyber Security News
Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Windows Vulnerability Exploit Released
  • AWS Enhances Security Hub with Cross-Domain Integration
  • Chrome’s AI Assistant Vulnerability Patched to Prevent Risks
  • OCRFix Botnet Trojan Uses Blockchain for Stealth Operations
  • OpenClaw Flaw Could Allow AI Takeover via Malicious Sites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Windows Vulnerability Exploit Released
  • AWS Enhances Security Hub with Cross-Domain Integration
  • Chrome’s AI Assistant Vulnerability Patched to Prevent Risks
  • OCRFix Botnet Trojan Uses Blockchain for Stealth Operations
  • OpenClaw Flaw Could Allow AI Takeover via Malicious Sites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News