Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New TrickMo Variant Enhances Android Network Exploits

New TrickMo Variant Enhances Android Network Exploits

Posted on May 12, 2026 By CWS

TrickMo Android Malware Expands Network Operations

A sophisticated new version of the TrickMo Android banking trojan has emerged, utilizing The Open Network (TON) for its command-and-control (C2) operations. Security researchers from ThreatFabric have identified this variant, which was active between January and February 2026, targeting users in France, Italy, and Austria.

Enhanced Network Capabilities

The latest iteration of TrickMo introduces advanced network features, allowing compromised devices to act as programmable pivots and exit nodes in a network. This variant continues to use a runtime-loaded APK, known as dex.module, which now includes enhanced functionalities such as reconnaissance, SSH tunnelling, and SOCKS5 proxying, according to a report by ThreatFabric shared with The Hacker News.

This newly observed behavior signifies a strategic evolution from its original design, which primarily focused on exploiting Android’s accessibility services to hijack one-time passwords (OTPs) and phish for credentials, among other malicious activities.

Distribution and Architecture Shifts

TrickMo’s latest versions, referred to as TrickMo C, are disseminated via phishing websites and dropper applications. These droppers disguise themselves as adult versions of popular apps like TikTok, while the malware itself impersonates Google Play Services. The architecture has now shifted to leverage the TON decentralized blockchain, ensuring more covert C2 communications.

ThreatFabric reports that TrickMo integrates a native TON proxy, which operates on a loopback port initiated at the process start. This setup allows all C2 requests to be routed through .adnl hostnames resolved via the TON network, effectively blending malicious traffic with legitimate TON activity.

Operational Expansion and Future Developments

The malware’s subsystem now supports a variety of commands typically used for network reconnaissance, such as curl, dnslookup, and ping. This enhancement effectively transforms the malware from a simple banking trojan into a tool for managed network foothold, providing attackers with a remote shell-equivalent capability.

Additionally, a SOCKS5 proxy feature enables the infected device to serve as a network exit node, circumventing IP-based fraud detection systems. Despite these advancements, the malware also contains dormant features suggesting potential future expansions, including the Pine hooking framework and NFC-related permissions.

ThreatFabric highlights that by using embedded local TON proxies, TrickMo significantly reduces the effectiveness of traditional network-blocking and takedown efforts. This development marks a concerning shift in the operational capabilities of malware, emphasizing the need for robust cybersecurity measures to protect against evolving threats.

The Hacker News Tags:Android malware, banking trojan, cyber threat, Cybersecurity, malware analysis, mobile security, network reconnaissance, Phishing, remote access, SOCKS5 proxy, TON network, TrickMo

Post navigation

Previous Post: North Korean Hackers Exploit Git Hooks for Malware Deployment
Next Post: CRPx0 Malware Exploits OnlyFans for Cross-Platform Attacks

Related Posts

⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More ⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More The Hacker News
Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine The Hacker News
Iranian Infy Hackers Reactivate C2 Servers After Internet Blackout Iranian Infy Hackers Reactivate C2 Servers After Internet Blackout The Hacker News
BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers The Hacker News
AI Enhances Security Testing in Dynamic Environments AI Enhances Security Testing in Dynamic Environments The Hacker News
Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • BWH Hotels Data Breach Exposes Guest Information for Months
  • Fake Chrome Extension Mimics TronLink, Steals Crypto Data
  • CRPx0 Malware Exploits OnlyFans for Cross-Platform Attacks
  • New TrickMo Variant Enhances Android Network Exploits
  • North Korean Hackers Exploit Git Hooks for Malware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • BWH Hotels Data Breach Exposes Guest Information for Months
  • Fake Chrome Extension Mimics TronLink, Steals Crypto Data
  • CRPx0 Malware Exploits OnlyFans for Cross-Platform Attacks
  • New TrickMo Variant Enhances Android Network Exploits
  • North Korean Hackers Exploit Git Hooks for Malware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark