Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Organized strike deals with hackers who invaded twice

New TrickMo variant creates Android network pivot using TON C2 and SOCKS5

Webinar: What are the riskiest SOC alerts that go unanswered?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New TrickMo variant creates Android network pivot using TON C2 and SOCKS5
Identity

New TrickMo variant creates Android network pivot using TON C2 and SOCKS5

By May 12, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMay 12, 2026Malware/Mobile Security

Cybersecurity researchers have reported a new version of TrickMo, an Android banking Trojan that uses The Open Network (TON) for command and control (C2).

This new variant was observed by ThreatFabric from January to February 2026 and was observed actively targeting users of banks and crypto wallets in France, Italy, and Austria.

“TrickMo relies on a runtime-loaded APK (dex.module), which was also used in previous variants, but has been updated with new features that add new network-oriented features such as reconnaissance, SSH tunneling, and SOCKS5 proxy functionality that allows infected devices to act as programmable network pivots and traffic exit nodes,” the Dutch mobile security company said in a report shared with The Hacker News.

TrickMo is the name assigned to device takeover (DTO) malware that has been active since late 2019. The malware was first reported by CERT-Bund and IBM X-Force and described its ability to exploit Android accessibility services to hijack one-time passwords (OTPs).

It also comes equipped with a wide range of features such as credential phishing, keystroke logging, screen recording, facilitating live screen streaming, and SMS message interception, essentially giving operators complete remote control of the device.

The latest version, labeled TrickMo C, is distributed via a step-by-step website and dropper app. The latter acts as a conduit for a dynamically loaded APK (“dex.module”) obtained at runtime from attacker-controlled infrastructure. A notable change in architecture involves the use of the TON decentralized blockchain for stealth C2 communications.

“TrickMo embeds a native TON proxy that launches on the loopback port when the host APK starts the process,” ThreatFabric said. “The bot’s HTTP client connects through that proxy, so all outgoing command and control requests are addressed to the .adnl hostname and resolved through the TON overlay.”

A dropper app containing malware pretends to be an adult version of TikTok through Facebook, but the actual malware impersonates Google Play Services –

com.app16330.core20461 or com.app15318.core1173 (dropper) Uncle.collop416.wifekin78 or nibong.lida531.butler836 (TrickMo)

While previous versions of “dex.module” implemented accessibility-driven remote control functionality through socket.io-based channels, the new version leverages a network operations subsystem that turns the malware into a controlled scaffolding tool rather than a traditional banking Trojan.

This subsystem supports commands such as curl, dnslookup, ping, telnet, and traceroute, providing attackers with “the equivalent of a remote shell for network reconnaissance from the victim’s network location, including the corporate and home networks to which the device is currently associated.”

Another key feature is a SOCKS5 proxy that turns compromised devices into network exit nodes for routing malicious traffic while disabling IP-based fraud detection signatures in banking, e-commerce, and cryptocurrency exchange services.

Additionally, TrickMo includes two hibernation functions that bundle the Pine hooking framework and declare extensive NFC-related permissions. However, neither is actually implemented. This may indicate that the core developers are looking to extend the functionality of this Trojan in the future.

“Instead of relying on traditional DNS or public internet infrastructure, this malware communicates through an .adnl endpoint that is routed through an embedded local TON proxy, reducing the effectiveness of traditional takedown and network blocking efforts while mixing traffic with legitimate TON activity,” ThreatFabric said.

“This latest variant extends the operational role of infected devices through SSH tunneling and authenticated SOCKS5 proxies, effectively turning infected phones into programmable network pivots and traffic exit nodes that originate connections from the victim’s own network environment.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWebinar: What are the riskiest SOC alerts that go unanswered?
Next Article Organized strike deals with hackers who invaded twice

Related Posts

Webinar: What are the riskiest SOC alerts that go unanswered?

May 12, 2026

Mini Shai-Hulud worm compromises packages including TanStack, Mistral AI, Guardrails AI

May 12, 2026

Why Agentic AI is the next security blind spot

May 12, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Organized strike deals with hackers who invaded twice

New TrickMo variant creates Android network pivot using TON C2 and SOCKS5

Webinar: What are the riskiest SOC alerts that go unanswered?

Mini Shai-Hulud worm compromises packages including TanStack, Mistral AI, Guardrails AI

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.