Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

TrickMo Variant Routes Android Trojan Traffic Through TON

May 11, 2026

Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks

May 11, 2026

Rushed Patches Follow Broken Embargo on Linux Kernel Vulnerabilities

May 11, 2026
Facebook X (Twitter) Instagram
Monday, May 11
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»TrickMo Variant Routes Android Trojan Traffic Through TON
News

TrickMo Variant Routes Android Trojan Traffic Through TON

Team-CWDBy Team-CWDMay 11, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new variant of the TrickMo Android banking trojan has moved its primary command-and-control (C2) transport onto The Open Network (TON) Blockchain, routing communications through the decentralized overlay’s .adnl identities to make traditional domain takedowns largely ineffective.

The variant, identified by ThreatFabric and labeled TrickMo C, was tracked between January and February 2026 in active campaigns against banking and wallet users in France, Italy and Austria, according to new analysis from the firm’s Mobile Threat Intelligence Team.

Telemetry indicated the variant was progressively replacing its predecessor across operator campaigns, with TikTok-themed lures circulated via Facebook ads.

TrickMo is a device-takeover trojan that abuses Android’s accessibility service to give operators a real-time interactive view of the compromised handset.

Its capabilities include credential phishing via WebView overlays, keylogging, screen streaming, full bidirectional remote control and silent suppression of one-time-password (OTP) notifications.

A Decentralized C2 Built on TON

The single largest change in the variant is the network layer. ThreatFabric said the host APK starts an embedded native TON proxy on a loopback port at process launch and wires the bot’s HTTP client through it, so every C2 request is addressed to an .adnl hostname and resolved within the TON overlay rather than through public DNS.

The handful of clearnet lookups the bot still performs are routed through a public DNS-over-HTTPS endpoint, so even those queries never reach the device’s local resolver.

The researchers said the design makes traditional domain takedowns largely ineffective, since operator endpoints exist as TON identities resolved inside the decentralized network. At the network edge, traffic appears indistinguishable from any other TON-enabled application’s output.

The Open Network is a legitimate decentralized platform originally built for Telegram, and ThreatFabric stressed that its use by TrickMo’s operators reflects abuse by a third party rather than any involvement by the TON project.

Devices Recast as Programmable Network Pivots

The variant also introduces a network-operative subsystem that turns infected handsets into programmable pivots.

Five operator commands run curl, dnslookup, ping, telnet and traceroute primitives from the device’s vantage point, giving the operator a shell-equivalent for reconnaissance inside any corporate or home network the handset is attached to.

Read more on similar Android trojans: Mirax Android Trojan Turns Devices Into Residential Proxy Nodes

A second set of commands provides socket-level tunneling through an embedded SSH client and an on-device SOCKS5 proxy with username and password authentication.

Chained together, ThreatFabric said the result is an authenticated programmable network exit on the victim’s device whose outbound traffic appears to originate from the victim’s IP, defeating IP-based fraud detection.

The variant also declares full NFC permissions and bundles the Pine hooking framework, although neither is exercised in the current code. ThreatFabric assessed both as reserved capabilities, provisioned in the host for runtime delivery later.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCritical cPanel Vulnerability Weaponized to Target Government and MSP Networks
Team-CWD
  • Website

Related Posts

News

Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks

May 11, 2026
News

Rushed Patches Follow Broken Embargo on Linux Kernel Vulnerabilities

May 11, 2026
News

Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

May 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

What it is and how to protect yourself

January 8, 2026

How it preys on personal data – and how to stay safe

October 23, 2025

Common Apple Pay scams, and how to stay safe

January 22, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.