top of page

Frogblight banking Trojan targets Android users in Turkey

  • Dec 16, 2025
  • 2 min read

Key Findings


  • In August 2025, Kaspersky researchers discovered a new Android banking Trojan dubbed "Frogblight" targeting individuals in Turkey.

  • The malware initially disguised itself as an app for accessing court case files via an official government webpage, but later adopted more universal disguises like the Chrome browser.

  • Frogblight can use official government websites as an intermediary step to steal banking credentials and has spyware capabilities to collect SMS messages, app lists, and device filesystem information.

  • The malware is rapidly evolving, with researchers observing frequent updates adding new features throughout September.

  • There are potential ties between Frogblight and the notorious Coper banking Trojan, suggesting the operators may be distributing it under a Malware-as-a-Service (MaaS) model.


Background


While performing an analysis of mobile malware, Kaspersky researchers discovered several samples belonging to a new malware family. Despite still being under development, the malware already contained a significant amount of functionality, allowing it to be classified as a banking Trojan.


As new versions of this malware continued to appear, the researchers began closely monitoring its development. They also managed to discover the malware's control panel, and based on the "fr0g" name shown there, dubbed this family "Frogblight".


Initial Infection


The researchers believe that smishing, or SMS phishing, is one of the distribution vectors for Frogblight, with users having to install the malware themselves. They found complaints from Turkish users about phishing SMS messages claiming the user was involved in a court case and containing links to download malware.


Early versions of Frogblight were disguised as an app for accessing court case files via an official government webpage, using the same names as the files for downloading from the links mentioned in the phishing SMS messages.


The researchers also discovered a phishing website that was distributing Frogblight, posing as a website for viewing a court file. The admin panel of this website allowed the threat actors to view statistics on Frogblight downloads, though the counter was not fully implemented.


App Features


The initial Frogblight samples disguised themselves as an app for accessing court case files via an official government webpage. One such sample (9dac23203c12abd60d03e3d26d372253) was analyzed by the researchers.


After being granted the requested permissions, the malware opens the official government webpage for accessing court case files in a WebView, prompting the victim to sign in. If the user chooses to sign in via online banking, Frogblight waits for the banking login page to load and then injects JavaScript code to capture the user's input and send it to the command-and-control (C2) server.


Frogblight also has spyware functionality, allowing it to collect SMS messages, a list of installed apps on the device, and device filesystem information. It can also send arbitrary SMS messages.


Ongoing Development


The researchers observed that Frogblight is under active development, with new features being added throughout September. This may indicate that a feature-rich malware app for Android is being developed, which could potentially be distributed under the MaaS model.


Moreover, the researchers found a GitHub profile containing repositories with Frogblight, which had also created repositories with the Coper malware, which is distributed under the MaaS model. This connection suggests that the operators behind Coper may have expanded their portfolio to include Frogblight.


Sources


  • https://securelist.com/frogblight-banker/118440/

  • https://securityonline.info/frogblight-android-banking-trojan-targets-turkey-via-fake-e-gov-smishing-and-webview/

  • https://malware.news/t/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users/102575

  • https://www.reddit.com/r/SecOpsDaily/comments/1pn20dd/frogblight_threatens_you_with_a_court_case_a_new/

  • https://x.com/shah_sheikh/status/2000461924098556387

  • https://cometbar.co.uk/node/32266

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page