TrickMo Android Malware’s New Trick: TON Blockchain Powers Covert Command Control
Introduction to a Sneaky Android Threat
The world of mobile cybersecurity just got a new headache. A dangerous Android malware called
If you use Android in Europe, pay close attention. This malware targets bank accounts and crypto wallets in countries like France, Italy, and Austria. It hides as popular apps like TikTok or video streamers. One wrong download, and your money could be at risk.
What is TrickMo Malware?
TrickMo is a type of banking trojan. It steals login details and money from users. First seen in 2019, it has grown a lot over the years. Developers keep updating it to beat antivirus apps and security checks.
Recent studies show over 40 versions of TrickMo. They spread through 16 different dropper apps. These connect to 22 command-and-control (C2) servers. The goal? Grab sensitive data from users around the world.
The latest version, tracked as Trickmo.C, popped up in January. It focuses on Europe but could spread further. Cybercriminals love it because it’s modular. That means it has parts that download and activate only when needed.
How TrickMo Spreads and Targets Victims
TrickMo hides in fake apps. You might see it as a TikTok clone or a streaming service. Once installed, it asks for permissions to access your camera, screen, SMS, and more.
It goes after big banks and crypto wallets. In Europe, it hits users in France, Italy, and Austria hardest. But no one is safe. The malware uses tricks like:
- Phishing overlays: Fake login screens that look real.
- Keylogging: Records every tap on your keyboard.
- Screen recording and streaming: Watches what you do live.
- SMS interception: Steals one-time passwords (OTPs).
- Clipboard changes: Swaps your copied wallet addresses.
- Notification blocking: Hides bank alerts.
- Screenshot grabs: Captures your screen at key moments.
This two-stage design is smart. First, a loader app sticks around on your phone. Then, it downloads the real attack module. This keeps it small and sneaky.
The Big New Feature: for C2
Here’s the game-changer. The new TrickMo uses The Open Network (TON) blockchain for talking to its bosses. TON started with Telegram. It’s a peer-to-peer network that lets devices chat through an encrypted overlay. No need for normal internet servers that can be blocked.
Instead of easy-to-block domains, it uses .ADNL addresses. These are 256-bit IDs. They hide the real IP address and ports. A local TON proxy runs right on your infected phone. All traffic looks like normal TON app use – fully encrypted.
Why is this bad for defenders?
- Domain blocks don’t work. No public DNS involved.
- Network watchers see only TON traffic. It blends in.
- Servers are hard to find or shut down.
TON makes C2 super stealthy. Cybercriminals can send commands like steal data or update the malware without raising alarms.
New Commands and Hidden Tools in TrickMo
This version adds fresh commands. It expands what attackers can do remotely. While exact lists vary, expect more ways to grab crypto keys or bank info.
Researchers spotted the Pine runtime hooking framework. It can spy on network calls and Firebase data. Right now, it’s not active. But it could wake up anytime.
TrickMo also asks for NFC permissions. It reports NFC features in its data sends. No active NFC theft yet, but watch for contactless card scams soon.
Why TON Makes Sense for Malware
TON is fast, cheap, and decentralized. Perfect for crypto crooks. It ties into Telegram, where many scams start. By using TON, TrickMo stays ahead of old-school blocks.
This isn’t the first blockchain malware trick. But TON’s overlay network is next-level. It turns legit tech into a criminal tool. Users of TON wallets face extra risk now.
Real-World Impact on Users and Crypto
Imagine downloading a fake TikTok app. Suddenly, your bank app opens a fake screen. You enter details – gone. Or a crypto transfer gets swapped via clipboard. Losses can hit thousands per victim.
Europe sees the heat, but global spread is likely. Crypto users: Double-check wallet apps. Banks: Push for better mobile alerts.
How to Protect Yourself from TrickMo and Similar Threats
Stay safe with these simple steps:
- Download apps only from Google Play Store.
- Keep app count low. Delete unused ones.
- Stick to trusted developers.
- Turn on Google Play Protect. It scans for malware.
- Use a VPN and antivirus like Malwarebytes or Bitdefender.
- Enable two-factor auth (2FA) everywhere. Use app-based, not SMS.
- Check app permissions. Deny camera or SMS if not needed.
- Update Android and apps regularly.
For crypto fans: Use hardware wallets. Verify addresses twice. Avoid sideloading apps.
The Bigger Picture in Android Malware Trends
TrickMo shows how malware evolves. From basic SMS stealers to blockchain C2. Other threats like BeatBanker (fake Starlink) or NGate (NFC theft) use similar disguises.
Telegram mini-apps spread scams too. Android is a hot target because billions use it. Security firms track these daily.
Conclusion: Stay Vigilant in the Crypto World
Share this post if it helped. What Android threats worry you most? Drop a comment below!
Discuss this news on our Telegram Community. Subscribe to us on Google news and do follow us on Twitter @Blockmanity
Did you like the news you just read? Please leave a feedback to help us serve you better
Disclaimer: Blockmanity is a news portal and does not provide any financial advice. Blockmanity's role is to inform the cryptocurrency and blockchain community about what's going on in this space. Please do your own due diligence before making any investment. Blockmanity won't be responsible for any loss of funds.
















