FrogBlight Android Banking Trojan Targets Turkish Android Users via Smishing and Fake Government Court File Portals

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

Key Takeaways

A new and evolving Android banking trojan named FrogBlight has been discovered in a campaign primarily targeting individuals in Turkiye. Initially observed in August 2025, this sophisticated mobile malware is distributed through smishing messages that lure victims with fake court case notifications. 

These messages direct users to phishing websites impersonating official government pages, convincing them to download and install the malicious application. Once installed, the malware disguises itself as a legitimate government app or a common browser like Chrome.

Technical Capabilities and Credential Theft

FrogBlight is engineered to steal sensitive financial information with precision, according to the latest report from SecureList by Kaspersky. After a victim grants the necessary permissions, the malware opens a legitimate government portal within a WebView interface. 

The phishing website distributing Frogblight
The phishing website distributing Frogblight | Source: SecureList by Kaspersky

When the user attempts to sign in via their online banking provider, FrogBlight injects malicious JavaScript code to capture their login credentials. This data is then exfiltrated to a command-and-control (C2) server.

The admin panel interface of the website from which Frogblight is downloaded
The admin panel interface of the website from which Frogblight is downloaded | Source: SecureList by Kaspersky

Beyond credential theft, the malware functions as spyware, capable of collecting and sending:

Ongoing Development and MaaS Potential

The FrogBlight banking malware appears to be under active development, with newer versions incorporating additional features like keylogging, geofencing to avoid specific regions like the U.S., and anti-emulator checks. 

The communication protocol has also evolved from a REST API to WebSockets. The presence of a web panel for managing infected devices suggests that FrogBlight may be distributed under a Malware-as-a-Service (MaaS) model, potentially widening its reach and impact.

In April, a novel, advanced MaaS platform for Android was used in a phishing campaign impersonating banks.

In June, a new zero-day exploit by Stealth Falcon targeted Middle East government and defense entities. October reports noted the Maverick banking trojan was spreading on WhatsApp using worm-like propagation. 


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: