Weekly review

ThreatNoir Afternoon Brief — May 11

2026-05-11Afternoon4 articles
Audio
Listen to the episode

Afternoon Review in IT Security — May 11, 2026

The afternoon security briefing for May 11, 2026 highlights emerging threats across mobile banking malware, AI-powered phishing infrastructure abuse, and the disruption of underground marketplaces. These developments underscore persistent challenges in defending against evolving attack methods that leverage both blockchain technology and artificial intelligence for malicious purposes.

TrickMo Android Banker Adopts TON Blockchain for Covert Communications

A new variant of the TrickMo Android banking malware has been identified in campaigns targeting users across Europe, introducing enhanced capabilities and leveraging blockchain technology for command-and-control operations. The malware now utilizes The Open Network (TON) blockchain to establish stealthy communications channels, making detection and attribution significantly more difficult for security researchers and defenders. This development represents a notable shift in how banking trojans attempt to maintain persistence and evade network-based detection systems. Source: TrickMo Android banker adopts TON blockchain for covert comms

Hackers Exploit Vercel GenAI to Mass-Produce Convincing Phishing Sites

Threat actors are actively abusing Vercel GenAI services to rapidly generate and deploy phishing sites that convincingly impersonate major global brands including Microsoft, Adidas, and Nike. The exploitation of legitimate AI infrastructure enables attackers to create large volumes of authentic-looking phishing pages with minimal effort, significantly increasing the difficulty of detection and takedown efforts. This abuse of generative AI platforms demonstrates how legitimate services can be weaponized to scale social engineering attacks at unprecedented rates. Source: Hackers Exploit Vercel GenAI to Mass-Produce Convincing Phishing Sites

Resurrected Crimenetwork Marketplace Taken Down, Administrator Arrested

Law enforcement successfully dismantled the second iteration of the Crimenetwork marketplace, a German-speaking online crime hub that had accumulated over 22,000 registered users and hosted more than 100 active sellers. The takedown operation resulted in the arrest of a marketplace administrator, disrupting a significant node in the underground economy that facilitated the sale of stolen data, malware, and other illicit goods and services. Source: Resurrected 'Crimenetwork' Marketplace Taken Down, Administrator Arrested

Over 500 Organizations Hit in Years-Long Phishing Campaign

A sustained phishing campaign spanning multiple years has successfully compromised over 500 organizations across critical sectors including aviation, critical infrastructure, energy, logistics, public administration, and technology. The Operation HookedWing phishing kit has been employed throughout this extended campaign, demonstrating the effectiveness of persistent, low-intensity attack strategies that target diverse industry verticals. The breadth of affected sectors underscores the widespread nature of this threat and the importance of cross-sector information sharing. Source: Over 500 Organizations Hit in Years-Long Phishing Campaign

Today's threat landscape reflects a troubling convergence of sophisticated techniques: blockchain-enabled command-and-control infrastructure, AI-powered phishing automation, and persistent multi-year campaigns that continue to evade detection. Organizations must prioritize investment in advanced threat detection, employee security awareness, and cross-sector intelligence sharing to effectively counter these evolving threats.

Sources & IOCs

Source articles and extracted indicators (defanged where appropriate).

TrickMo Android banker adopts TON blockchain for covert comms
Malware3
  • TrickMo
    Android banking malware family active since September 2019, targeting banking and crypto wallets.
  • Trickmo.C
    Latest variant discovered by ThreatFabric in January 2026, uses TON blockchain for C2.
  • Pine
    Runtime hooking framework used by TrickMo to intercept networking and Firebase operations.