HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

TrickMo Android Banking Trojan Uses TON C2 and SOCKS5 Proxies to Target European Financial Users

A newly observed TrickMo Android banking trojan employs The Open Network (TON) for command‑and‑control and creates SOCKS5 proxies to pivot traffic, actively targeting banking and cryptocurrency wallet users in France, Italy, and Austria. The technique complicates detection and expands the threat surface for third‑party mobile ecosystems.

LiveThreat™ Intelligence · 📅 May 12, 2026· 📰 thehackernews.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
1 sector(s)
Actions
3 recommended
📰
Source
thehackernews.com

TrickMo Android Banking Trojan Variant Uses TON C2 and SOCKS5 to Pivot Networks, Targeting Users in France, Italy, and Austria

What Happened — Researchers identified a new TrickMo Android banking trojan that leverages The Open Network (TON) for command‑and‑control and establishes SOCKS5 proxies to pivot traffic through infected devices. The variant was active in early 2026 and specifically targeted banking and cryptocurrency wallet users in France, Italy, and Austria.

Why It Matters for TPRM

  • Mobile‑based credential theft can compromise downstream financial services and crypto platforms.
  • The use of TON C2 makes detection harder for traditional network monitoring tools.
  • SOCKS5 pivots enable attackers to route additional malicious traffic, expanding the attack surface of any third‑party mobile‑app ecosystem.

Who Is Affected — Financial services, cryptocurrency exchanges, and any SaaS providers that integrate with mobile banking or wallet apps in the affected European regions.

Recommended Actions

  • Review any third‑party mobile app vendors for secure development practices and anti‑malware controls.
  • Enforce mobile device management (MDM) policies that block unknown C2 protocols (e.g., TON).
  • Conduct threat‑modeling for SOCKS5 proxy abuse and monitor network traffic for anomalous outbound connections.

Technical Notes — The trojan loads a runtime‑generated APK module (dex.module) to evade static analysis, communicates with C2 over TON’s decentralized network, and sets up a SOCKS5 proxy to relay traffic from compromised devices. No public CVE is associated; the threat is driven by malware techniques rather than a software vulnerability. Source: The Hacker News

📰 Original Source
https://thehackernews.com/2026/05/new-trickmo-variant-uses-ton-c2-and.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.