Ransomware & Malware

TrickMo Android Banker Uses TON Blockchain for Stealth C2

Android banker TrickMo has adopted The Open Network (TON) blockchain for covert command-and-control, making it harder to detect and block. This isn't just an update; it's an architectural shift in how malware operates.

Conceptual image representing a hidden network connection within a blockchain structure.

Key Takeaways

  • TrickMo Android banker now uses The Open Network (TON) blockchain for covert command-and-control (C2).
  • TON integration makes C2 infrastructure significantly harder to identify, block, or take down due to decentralized and encrypted communication.
  • New capabilities in Trickmo.C include advanced network reconnaissance and tunneling tools, indicating a move towards deeper system compromise and pivot potential.
  • This adoption of decentralized tech by malware highlights a growing trend in threat actor operational security strategy.

40 variants. 22 C2 infrastructures. This October alone. That’s the scale Zimperium reported for the TrickMo Android banking malware. But numbers only tell part of the story. The real shift? How TrickMo is now hiding in plain sight, using the decentralized architecture of The Open Network (TON) blockchain for its command-and-control (C2) communications. This isn’t your grandpa’s botnet; it’s a fundamental architectural evolution, and it’s making life hell for defenders.

ThreatFabric researchers have been tracking the latest iteration, dubbed ‘Trickmo.C,’ since January. They’ve observed it masquerading as familiar apps – think TikTok or streaming services – specifically targeting banking and crypto wallets of users across France, Italy, and Austria. The goal is classic: phish for credentials, steal data, and generally ruin your financial day.

But the headline grabber, the thing that makes you stop and actually think about what’s happening under the hood, is the TON integration. Instead of relying on traditional, often discoverable, IP addresses and domain names for C2 servers, TrickMo now use .ADNL addresses routed through an embedded local TON proxy on the infected device. TON, for the uninitiated, is a peer-to-peer network that emerged from the Telegram ecosystem, offering an encrypted overlay network. The magic here? It uses a 256-bit identifier, not a public DNS entry. This effectively abstracts away the server infrastructure, making it significantly harder to pinpoint, block, or take offline. As ThreatFabric put it:

“Traditional domain takedowns are largely ineffective because the operator’s endpoints do not rely on the public DNS hierarchy and instead exist as TON .adnl identities resolved inside the overlay network itself.”

This is a critical architectural pivot. Historically, tracking malware C2 involved a tedious, albeit effective, process of DNS lookup, IP tracing, and server takedowns. The dark web was a sprawling, albeit hidden, digital city with identifiable addresses. Now, TrickMo is operating in a more distributed, ephemeral space. Traffic-pattern detection at the network edge sees only encrypted TON traffic, indistinguishable from any other legitimate TON application’s outbound flow. It’s like trying to find a specific needle in a haystack made of other, identical needles, all buried in a cloud of digital dust.

TrickMo’s core capabilities remain terrifyingly effective. It’s a modular beast with a two-stage design: a loader APK for persistence, and a runtime-downloaded module for the dirty work. This includes familiar, yet potent, tools: phishing overlays to snatch login details, keylogging, screen recording, live screen streaming, SMS interception, OTP suppression (a particularly nasty touch), clipboard manipulation, notification filtering, and good old-fashioned screenshotting.

The new commands seen in Trickmo.C reveal a desire for deeper system interaction and reconnaissance. We’re talking curl, dnsLookup, ping, telnet, traceroute – standard network diagnostics that can be used to map the victim’s environment. But the inclusion of SSH tunneling, remote port forwarding, and local port forwarding alongside authenticated SOCKS5 proxy support signals a far more sophisticated approach to establishing persistent access and exfiltrating data. This isn’t just about stealing bank logins anymore; it’s about turning the compromised device into a launchpad for further attacks or a relay for other malicious activities.

The researchers also noted the presence of the Pine runtime hooking framework, usually employed for intercepting network and Firebase operations. While currently inactive, its declaration suggests future plans for even deeper system integration. Similarly, the extensive NFC permissions and reported capabilities, though currently unused, hint at potential future exploitation vectors, perhaps for proximity-based attacks or credential theft via NFC interactions.

Why Does This TON Integration Matter for Security?

The adoption of TON by a sophisticated banking trojan like TrickMo is more than just a new feature; it’s a bellwether for how threat actors are embracing decentralized technologies to enhance their operational security. Traditional C2 infrastructure is a liability. Centralized servers are single points of failure, easily targeted by law enforcement and cybersecurity firms. By moving to a blockchain-based network like TON, malware operators are abstracting away these vulnerabilities. The complexity of the TON network itself, coupled with the encryption and peer-to-peer routing, creates a significantly higher barrier to entry for attribution and takedown efforts. This means longer operational lifespans for malware campaigns and a more challenging threat landscape for mobile security.

What Can Users Actually Do?

Look, no amount of technical wizardry can fully protect against a determined attacker who has compromised your device. However, the advice remains the bedrock of mobile security. Stick to the Google Play Store. Be judicious about the apps you install – if you don’t need it, uninstall it. Vet the publishers; a long history of reputable releases is better than a shiny new app with a questionable pedigree. And for heaven’s sake, keep Google Play Protect active. It’s your first line of defense against known threats, even if it can’t stop the truly novel ones.


🧬 Related Insights

Frequently Asked Questions

What is The Open Network (TON) and how is it used by malware? TON is a decentralized peer-to-peer network designed for secure and fast communication. Malware like TrickMo uses its .ADNL addresses and encrypted overlay network to hide its command-and-control servers, making them difficult for security researchers to locate and block.

Will this new TrickMo variant steal my cryptocurrency? TrickMo explicitly targets banking and cryptocurrency wallets. While it aims to steal credentials, any app that handles financial transactions on your device is a potential target. Practicing good security hygiene is crucial.

How can I protect myself from Android banking malware like TrickMo? Only download apps from official app stores like Google Play, be cautious about app permissions, keep your device’s operating system and apps updated, and ensure security features like Google Play Protect are enabled and active.

Written by
Threat Digest Editorial Team

Curated insights, explainers, and analysis from the editorial team.

Frequently asked questions

What is The Open Network (TON) and how is it used by malware?
TON is a decentralized peer-to-peer network designed for secure and fast communication. Malware like TrickMo uses its `.ADNL` addresses and encrypted overlay network to hide its command-and-control servers, making them difficult for security researchers to locate and block.
Will this new TrickMo variant steal my cryptocurrency?
TrickMo explicitly targets banking and cryptocurrency wallets. While it aims to steal credentials, any app that handles financial transactions on your device is a potential target. Practicing good security hygiene is crucial.
How can I protect myself from Android banking malware like TrickMo?
Only download apps from official app stores like Google Play, be cautious about app permissions, keep your device's operating system and apps updated, and ensure security features like Google Play Protect are enabled and active.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.