Description

Kaspersky security researchers have identified a new and sophisticated Android banking Trojan named Frogblight, primarily targeting users in Turkey by impersonating legitimate government services. First observed in August 2025, the malware relies heavily on social engineering, using fraudulent SMS messages that warn recipients about supposed legal cases. These messages lure victims into downloading a fake government application that appears to provide access to official court documents, making the threat highly convincing and effective. Once installed, Frogblight abuses Android permissions to gain extensive control over the device. It loads genuine Turkish government webpages inside a malicious WebView, then requests excessive access such as SMS handling, file system access, and device information. When victims attempt to use online banking services, the malware injects malicious scripts to capture login credentials and silently transmits them to attacker-controlled servers. Over time, newer variants expanded functionality to include contact theft, call log collection, keystroke monitoring, and advanced evasion techniques such as emulator detection and geofencing. Kaspersky’s analysis suggests Frogblight is actively evolving and may be offered under a Malware-as-a-Service model. Researchers identified an online control panel that allows attackers to manage infected devices and launch large-scale SMS campaigns. Links to the Coper malware family and Turkish-language code comments point to skilled operators. To reduce risk, users are advised to distrust unsolicited legal SMS messages, avoid unofficial app sources, keep devices updated, and use reputable mobile security solutions.