:

TRICKMO BANKER MALWARE NOW USES TON BLOCKCHAIN

AI DESK1 MIN READ
MON, MAY 11, 2026

■ AI-SUMMARIZED FROM 1 SOURCE ▸ TIMELINE

A new variant of TrickMo Android banking malware is leveraging The Open Network (TON) blockchain for command-and-control communications. The malware, discovered in campaigns targeting European users, introduces expanded functionality while using blockchain infrastructure to evade detection.

TrickMo, a known Android banking trojan, has evolved to incorporate TON blockchain technology for its C2 infrastructure. This shift represents an escalation in evasion tactics, as blockchain-based communications are harder to intercept and block through traditional security measures. The updated variant introduces new commands alongside its existing banking credential theft capabilities. Security researchers tracking the malware note that European users remain primary targets, with distribution occurring through established infection chains. The adoption of TON for covert communications reflects a broader trend among malware operators seeking resilience against network-level defenses. Unlike centralized C2 servers, blockchain-based infrastructure distributes command delivery across a decentralized network, complicating takedown efforts. Security firms recommend users in affected regions exercise caution with app installations and enable banking app protections. Organizations should monitor for TrickMo indicators and consider TON blockchain communication patterns as part of threat detection strategies.

■ SOURCES

Bleeping Computer

■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE

■ MORE FROM THE SECURITY DESK

Large language models are collapsing the timeline between bug discovery and working exploits, making traditional 90-day disclosure policies ineffective. Security researcher Himanshu Anand argues critical vulnerabilities now require immediate patching.

4H AGOAI Desk

A malicious Obsidian plugin was used in targeted attacks to deliver Phantom Pulse, a remote access trojan capable of full system compromise. The attack demonstrates how legitimate tools remain vulnerable to abuse by threat actors.

7H AGOIndustry Desk

A critical security vulnerability identified as CVE-2024-YIKES has been detailed in a new incident report. The disclosure outlines technical specifics and potential impact on affected systems.

17H AGOIndustry Desk

Police forces across the UK are failing to adequately protect child victims of online sexual abuse due to insufficient funding and resources. Her Majesty's Chief Inspector of Constabulary has warned that referrals are increasing by two-thirds annually while law enforcement cannot keep pace.

17H AGOIndustry Desk

■ SUBSCRIBE TO THE DAILY BRIEF

ONE EMAIL, 5 STORIES, 06:00 UTC. UNSUBSCRIBE ANYTIME.