Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»TrickMo Android banker adopts TON blockchain for covert comms
    Cybersecurity

    TrickMo Android banker adopts TON blockchain for covert comms

    adminBy adminMay 11, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    TrickMo Android banker adopts TON blockchain for covert comms
    Share
    Facebook Twitter LinkedIn Pinterest Email

    TrickMo Android banker adopts TON blockchain for covert comms

    A new variant of the TrickMo Android banking malware, delivered in campaigns targeting users across Europe, introduces new commands and uses The Open Network (TON) for stealthy command-and-control communications.

    The TrickMo banker was first spotted in September 2019 and has remained in active development, constantly receiving updates since then.

    In October 2024, Zimperium analyzed 40 variants of the malware delivered via 16 droppers, communicating with 22 distinct command-and-control (C2) infrastructures, and targeting sensitive data belonging to users worldwide.

    The latest variant was discovered by ThreatFabric, which tracks it as ‘Trickmo.C’. The researchers have been observing this version since January.

    In a report today, ThreatFabric says that the malware is disguised as TikTok or streaming apps and targets banking and cryptocurrency wallets of users in France, Italy, and Austria.

    The key new feature in the current variant is the TON-based communication with the operator, which uses .ADNL addresses routed through an embedded local TON proxy running on the infected device.

    TON is a decentralized peer-to-peer network originally developed around the Telegram ecosystem that allows devices to communicate with the web via an encrypted overlay network rather than publicly exposed internet servers.

    TON uses a 256-bit identifier instead of a normal domain, which hides the IP address and communication port, thus making the real server infrastructure more difficult to identify, block, or take down.

    “Traditional domain takedowns are largely ineffective because the operator’s endpoints do not rely on the public DNS hierarchy and instead exist as TON .adnl identities resolved inside the overlay network itself,” explains ThreatFabric.

    “Traffic-pattern detection at the network edge sees only TON traffic, which is encrypted and indistinguishable from any other TON-enabled application’s outbound flow.”

    TrickMo architecture
    TrickMo operational architecture
    Source: ThreatFabric

    TrickMo’s capabilities

    TrickMo is a modular malware with a two-stage design: a host APK that serves as the loader and persistence layer, and a runtime-downloaded APK module that implements the offensive functionality.

    The malware targets banking credentials via phishing overlays, performs keylogging, screen recording, and live screen streaming, SMS interception, OTP notification suppression, clipboard modification, notification filtering, and screenshot capturing.

    ThreatFabric reports that the new variant adds the following commands and capabilities:

    • curl
    • dnsLookup
    • ping
    • telnet
    • traceroute
    • SSH tunneling
    • remote port forwarding
    • local port forwarding
    • authenticated SOCKS5 proxy support

    The researchers have also spotted the Pine runtime hooking framework, previously used to intercept networking and Firebase operations, but it is currently inactive as there are no hooks installed.

    TrickMo also declares extensive NFC permissions and reports NFC capabilities in telemetry, but the researchers did not find any active NFC functionality.

    Android users are advised to only download software from Google Play, limit the number of installed apps on their phones, use apps only from reputable publishers, and ensure that Play Protect is active at all times.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot

    adopts Android banker Blockchain comms covert ton TrickMo
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleNew ‘Dirty Frag’ Linux Vulnerability Possibly Exploited in Attacks
    Next Article 11 ways to use AI for SEO (+best practices & challenges)
    admin
    • Website

    Related Posts

    Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals

    May 20, 2026

    GitHub confirms breach of 3,800 repos via malicious VSCode extension

    May 20, 2026

    Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

    May 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Selector targets the network visibility gap in multi-cloud infrastructure

    May 20, 2026

    How to Persuade Your Boss to Send You to Ahrefs Evolve in San Diego

    May 20, 2026

    Key AEO & Content Trends for 2026

    May 20, 2026

    Google adds llms.txt check to Chrome Lighthouse

    May 20, 2026
    Categories
    • Blogging (82)
    • Cybersecurity (1,955)
    • Privacy & Online Earning (223)
    • SEO & Digital Marketing (1,210)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (306)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Selector targets the network visibility gap in multi-cloud infrastructure

    May 20, 2026

    How to Persuade Your Boss to Send You to Ahrefs Evolve in San Diego

    May 20, 2026

    Key AEO & Content Trends for 2026

    May 20, 2026
    Most Popular
    • Selector targets the network visibility gap in multi-cloud infrastructure
    • How to Persuade Your Boss to Send You to Ahrefs Evolve in San Diego
    • Key AEO & Content Trends for 2026
    • Google adds llms.txt check to Chrome Lighthouse
    • Riverbed expands autonomous AI capabilities for Aternity platform
    • What’s New in WordPress 7.0? (Features & Screenshots)
    • How Denis Yurchak Built Yadaphone to $17,500 a Month and 20,000 Users in Just Over a Year After the Skype Shut Down
    • How to do SEO for beginners
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.