TrickMo Android Banker Adopts TON Blockchain for Covert Comms

TrickMo Android Banker Adopts TON Blockchain for Covert Comms

BleepingComputer
BleepingComputerMay 11, 2026

Companies Mentioned

Why It Matters

The shift to TON makes detection and takedown far harder, raising the threat level for mobile banking users and security teams worldwide.

Key Takeaways

  • TrickMo.C uses TON .adnl addresses for encrypted C2 traffic.
  • Malware masquerades as TikTok or streaming apps targeting European users.
  • New commands include curl, ping, SSH tunneling, and SOCKS5 proxy.
  • Embedded local TON proxy hides server infrastructure from DNS‑based blocking.
  • ThreatFabric observed 40 variants across 16 droppers in Oct 2024.

Pulse Analysis

Since its first appearance in 2019, the TrickMo Android banking trojan has become one of the most adaptable threats in the mobile malware ecosystem. Early versions relied on conventional HTTP or DNS‑based command‑and‑control servers, but the latest iteration, labeled TrickMo.C by ThreatFabric, has migrated to The Open Network (TON), a decentralized peer‑to‑peer overlay originally tied to the Telegram project. By embedding a lightweight TON proxy on the infected device, the malware can route all instructions through .adnl identifiers, effectively masking the true location of its operators.

The shift to TON dramatically raises the bar for detection and takedown. Unlike traditional domains, .adnl addresses are 256‑bit identifiers resolved inside the TON network, meaning they never appear in public DNS queries and cannot be blocked with standard domain‑filtering tools. Network‑edge sensors only see encrypted TON packets that are indistinguishable from legitimate TON‑enabled applications, rendering signature‑based traffic analysis largely ineffective. In addition to stealth, the new variant equips attackers with a suite of network utilities—curl, ping, SSH tunneling, and SOCKS5 proxy—allowing real‑time reconnaissance and lateral movement without exposing a separate C2 infrastructure.

For enterprises and financial institutions, the emergence of TON‑based C2 underscores the need for deeper mobile threat hunting and behavior‑based defenses. Endpoint security platforms must monitor anomalous proxy processes, unexpected permission requests such as NFC, and the launch of background services that communicate over non‑standard ports. Users should be reminded to install apps exclusively from Google Play, keep Play Protect enabled, and limit app permissions. As cybercriminals continue to weaponize decentralized networks, collaboration between security vendors, app stores, and regulators will be essential to develop rapid response mechanisms that can isolate and neutralize these hidden command channels.

TrickMo Android banker adopts TON blockchain for covert comms

Comments

Want to join the conversation?

Loading comments...