LIVE NEWS
  • Epic Fury has Navy rethinking carrier deployment tempo
  • New ‘trick’ fixes major flaw in neutral-atom quantum computers — inching us closer to a superpowerful system
  • Iran War Live Updates: Iran Lists Demands That Trump Deemed ‘Unacceptable’
  • Crypto and AI Could Be Dirty Words on 2026 Campaign Trail
  • TrickMo Variant Routes Android Trojan Traffic Through TON
  • AJC’s Andrew Morse steps down 3 years into $150 million reinvention : NPR
  • Türkiye Charts a Distinctive Course amid Middle East Turmoil
  • Sony Music Publishing to buy Recognition Music catalog; source says deal for $4 billion
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»TrickMo Variant Routes Android Trojan Traffic Through TON
Cybersecurity

TrickMo Variant Routes Android Trojan Traffic Through TON

primereportsBy primereportsMay 11, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
TrickMo Variant Routes Android Trojan Traffic Through TON
Share
Facebook Twitter LinkedIn Pinterest Email


A new variant of the TrickMo Android banking trojan has moved its primary command-and-control (C2) transport onto The Open Network (TON) Blockchain, routing communications through the decentralized overlay’s .adnl identities to make traditional domain takedowns largely ineffective.

The variant, identified by ThreatFabric and labeled TrickMo C, was tracked between January and February 2026 in active campaigns against banking and wallet users in France, Italy and Austria, according to new analysis from the firm’s Mobile Threat Intelligence Team.

Telemetry indicated the variant was progressively replacing its predecessor across operator campaigns, with TikTok-themed lures circulated via Facebook ads.

TrickMo is a device-takeover trojan that abuses Android’s accessibility service to give operators a real-time interactive view of the compromised handset.

Its capabilities include credential phishing via WebView overlays, keylogging, screen streaming, full bidirectional remote control and silent suppression of one-time-password (OTP) notifications.

A Decentralized C2 Built on TON

The single largest change in the variant is the network layer. ThreatFabric said the host APK starts an embedded native TON proxy on a loopback port at process launch and wires the bot’s HTTP client through it, so every C2 request is addressed to an .adnl hostname and resolved within the TON overlay rather than through public DNS.

The handful of clearnet lookups the bot still performs are routed through a public DNS-over-HTTPS endpoint, so even those queries never reach the device’s local resolver.

The researchers said the design makes traditional domain takedowns largely ineffective, since operator endpoints exist as TON identities resolved inside the decentralized network. At the network edge, traffic appears indistinguishable from any other TON-enabled application’s output.

The Open Network is a legitimate decentralized platform originally built for Telegram, and ThreatFabric stressed that its use by TrickMo’s operators reflects abuse by a third party rather than any involvement by the TON project.

Devices Recast as Programmable Network Pivots

The variant also introduces a network-operative subsystem that turns infected handsets into programmable pivots.

Five operator commands run curl, dnslookup, ping, telnet and traceroute primitives from the device’s vantage point, giving the operator a shell-equivalent for reconnaissance inside any corporate or home network the handset is attached to.

Read more on similar Android trojans: Mirax Android Trojan Turns Devices Into Residential Proxy Nodes

A second set of commands provides socket-level tunneling through an embedded SSH client and an on-device SOCKS5 proxy with username and password authentication.

Chained together, ThreatFabric said the result is an authenticated programmable network exit on the victim’s device whose outbound traffic appears to originate from the victim’s IP, defeating IP-based fraud detection.

The variant also declares full NFC permissions and bundles the Pine hooking framework, although neither is exercised in the current code. ThreatFabric assessed both as reserved capabilities, provisioned in the host for runtime delivery later.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAJC’s Andrew Morse steps down 3 years into $150 million reinvention : NPR
Next Article Crypto and AI Could Be Dirty Words on 2026 Campaign Trail
primereports
  • Website

Related Posts

Cybersecurity

Samsung Galaxy Z Flip 7 vs. Motorola Razr Ultra: I’ve used both, and this phone is my pick

May 11, 2026
Cybersecurity

Hackers abuse Google ads, Claude.ai chats to push Mac malware

May 10, 2026
Cybersecurity

ShinyHunters Claims Second Attack Against Instructure

May 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20265 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Epic Fury has Navy rethinking carrier deployment tempo
  • New ‘trick’ fixes major flaw in neutral-atom quantum computers — inching us closer to a superpowerful system
  • Iran War Live Updates: Iran Lists Demands That Trump Deemed ‘Unacceptable’
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.