{"id":177,"date":"2025-12-19T09:15:25","date_gmt":"2025-12-19T09:15:25","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/"},"modified":"2025-12-19T09:15:25","modified_gmt":"2025-12-19T09:15:25","slug":"frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/","title":{"rendered":"Frogblight threatens you with a court case: a new Android banker targets Turkish users"},"content":{"rendered":"<div>\n<p><img width=\"990\" height=\"400\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12211937\/SL-Frogblight-featured-990x400.jpg\" class=\"attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\"><\/p>\n<p>In August 2025, we discovered a campaign targeting individuals in Turkey with a new Android banking Trojan we dubbed \u201cFrogblight\u201d. Initially, the malware was disguised as an app for accessing court case files via an official government webpage. Later, more universal disguises appeared, such as the Chrome browser.<\/p>\n<p>Frogblight can use official government websites as an intermediary step to steal banking credentials. Moreover, it has spyware functionality, such as capabilities to collect SMS messages, a list of installed apps on the device and device filesystem information. It can also send arbitrary SMS messages.<\/p>\n<p>Another interesting characteristic of Frogblight is that we\u2019ve seen it updated with new features throughout September. This may indicate that a feature-rich malware app for Android is being developed, which might be distributed under the MaaS model.<\/p>\n<p>This threat is detected by Kaspersky products as HEUR:Trojan-Banker.AndroidOS.Frogblight.*, HEUR:Trojan-Banker.AndroidOS.Agent.eq, HEUR:Trojan-Banker.AndroidOS.Agent.ep, HEUR:Trojan-Spy.AndroidOS.SmsThief.de.<\/p>\n<h2 id=\"technical-details\">Technical details<\/h2>\n<h3 id=\"background\">Background<\/h3>\n<p>While performing an analysis of mobile malware we receive from various sources, we discovered several samples belonging to a new malware family. Although these samples appeared to be still under development, they already contained a lot of functionality that allowed this family to be classified as a banking Trojan. As new versions of this malware continued to appear, we began monitoring its development. Moreover, we managed to discover its control panel and based on the \u201cfr0g\u201d name shown there, we dubbed this family \u201cFrogblight\u201d.<\/p>\n<h3 id=\"initial-infection\">Initial infection<\/h3>\n<p>We believe that smishing is one of the distribution vectors for Frogblight, and that the users had to install the malware themselves. On the internet, we found complaints from Turkish users about phishing SMS messages convincing users that they were involved in a court case and containing links to download malware. versions of Frogblight, including the very first ones, were disguised as an app for accessing court case files via an official government webpage and were named the same as the files for downloading from the links mentioned above.<\/p>\n<p>While looking for online mentions of the names used by the malware, we discovered one of the phishing websites distributing Frogblight, which disguises itself as a website for viewing a court file.<\/p>\n<div id=\"attachment_118441\" style=\"width: 450px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155008\/frogblight-banker1.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118441\" class=\"size-full wp-image-118441\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155008\/frogblight-banker1.png\" alt=\"The phishing website distributing Frogblight\" width=\"440\" height=\"674\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155008\/frogblight-banker1.png 440w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155008\/frogblight-banker1-196x300.png 196w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155008\/frogblight-banker1-228x350.png 228w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155008\/frogblight-banker1-183x280.png 183w\" sizes=\"auto, (max-width: 440px) 100vw, 440px\"><\/a><\/p>\n<p id=\"caption-attachment-118441\" class=\"wp-caption-text\">The phishing website distributing Frogblight<\/p>\n<\/div>\n<p>We were able to open the admin panel of this website, where it was possible to view statistics on Frogblight malware downloads. However, the counter had not been fully implemented and the threat actor could only view the statistics for their own downloads.<\/p>\n<div id=\"attachment_118457\" style=\"width: 966px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12213226\/frogblight-banker2-1.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118457\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12213226\/frogblight-banker2-1.png\" alt=\"The admin panel interface of the website from which Frogblight is downloaded\" width=\"956\" height=\"503\" class=\"size-full wp-image-118457\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12213226\/frogblight-banker2-1.png 956w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12213226\/frogblight-banker2-1-300x158.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12213226\/frogblight-banker2-1-768x404.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12213226\/frogblight-banker2-1-665x350.png 665w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12213226\/frogblight-banker2-1-740x389.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12213226\/frogblight-banker2-1-532x280.png 532w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12213226\/frogblight-banker2-1-800x421.png 800w\" sizes=\"auto, (max-width: 956px) 100vw, 956px\"><\/a><\/p>\n<p id=\"caption-attachment-118457\" class=\"wp-caption-text\">The admin panel interface of the website from which Frogblight is downloaded<\/p>\n<\/div>\n<p>Additionally, we found the source code of this phishing website available in a public GitHub repository. Judging by its description, it is adapted for fast deployment to <a href=\"https:\/\/vercel.com\/\" target=\"_blank\" rel=\"noopener\">Vercel<\/a>, a platform for hosting web apps.<\/p>\n<div id=\"attachment_118443\" style=\"width: 1042px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155139\/frogblight-banker3.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118443\" class=\"size-full wp-image-118443\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155139\/frogblight-banker3.png\" alt=\"The GitHub repository with the phishing website source code\" width=\"1032\" height=\"1036\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155139\/frogblight-banker3.png 1032w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155139\/frogblight-banker3-300x300.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155139\/frogblight-banker3-1020x1024.png 1020w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155139\/frogblight-banker3-150x150.png 150w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155139\/frogblight-banker3-768x771.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155139\/frogblight-banker3-349x350.png 349w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155139\/frogblight-banker3-740x743.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155139\/frogblight-banker3-279x280.png 279w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155139\/frogblight-banker3-800x803.png 800w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155139\/frogblight-banker3-50x50.png 50w\" sizes=\"auto, (max-width: 1032px) 100vw, 1032px\"><\/a><\/p>\n<p id=\"caption-attachment-118443\" class=\"wp-caption-text\">The GitHub repository with the phishing website source code<\/p>\n<\/div>\n<h3 id=\"app-features\">App features<\/h3>\n<p>As already mentioned, Frogblight was initially disguised as an app for accessing court case files via an official government webpage. Let\u2019s look at one of the samples using this disguise (<code>9dac23203c12abd60d03e3d26d372253<\/code>). For analysis, we selected an early sample, but not the first one discovered, in order to demonstrate more complete Frogblight functionality.<\/p>\n<p>After starting, the app prompts the victim to grant permissions to send and read SMS messages, and to read from and write to the device\u2019s storage, allegedly needed to show a court file related to the user.<\/p>\n<p>The full list of declared permissions in the app manifest file is shown below:<\/p>\n<ul>\n<li>MANAGE_EXTERNAL_STORAGE<\/li>\n<li>READ_EXTERNAL_STORAGE<\/li>\n<li>WRITE_EXTERNAL_STORAGE<\/li>\n<li>READ_SMS<\/li>\n<li>RECEIVE_SMS<\/li>\n<li>SEND_SMS<\/li>\n<li>WRITE_SMS<\/li>\n<li>RECEIVE_BOOT_COMPLETED<\/li>\n<li>INTERNET<\/li>\n<li>QUERY_ALL_PACKAGES<\/li>\n<li>BIND_ACCESSIBILITY_SERVICE<\/li>\n<li>DISABLE_KEYGUARD<\/li>\n<li>FOREGROUND_SERVICE<\/li>\n<li>FOREGROUND_SERVICE_DATA_SYNC<\/li>\n<li>POST_NOTIFICATIONS<\/li>\n<li>QUICKBOOT_POWERON<\/li>\n<li>RECEIVE_MMS<\/li>\n<li>RECEIVE_WAP_PUSH<\/li>\n<li>REQUEST_IGNORE_BATTERY_OPTIMIZATIONS<\/li>\n<li>SCHEDULE_EXACT_ALARM<\/li>\n<li>USE_EXACT_ALARM<\/li>\n<li>VIBRATE<\/li>\n<li>WAKE_LOCK<\/li>\n<li>ACCESS_NETWORK_STATE<\/li>\n<li>READ_PHONE_STATE<\/li>\n<\/ul>\n<p>After all required permissions are granted, the malware opens the official government webpage for accessing court case files in WebView, prompting the victim to sign in. There are different sign-in options, one of them via online banking. If the user chooses this method, they are prompted to click on a bank whose online banking app they use and fill out the sign-in form on the bank\u2019s official website. This is what Frogblight is after, so it waits two seconds, then opens the online banking sign-in method regardless of the user\u2019s choice. For each webpage that has finished loading in WebView, Frogblight injects JavaScript code allowing it to capture user input and send it to the C2 via a REST API.<\/p>\n<p>The malware also changes its label to \u201cDavalar\u0131m\u201d if the Android version is newer than 12; otherwise it hides the icon.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"51.5%\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155320\/frogblight-banker4.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-118444\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155320\/frogblight-banker4.png\" alt=\"The app icon before (left) and after launching (right)\" width=\"410\" height=\"183\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155320\/frogblight-banker4.png 410w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12155320\/frogblight-banker4-300x134.png 300w\" sizes=\"auto, (max-width: 410px) 100vw, 410px\"><\/a><\/td>\n<td width=\"48.5%\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160012\/frogblight-banker5.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-118445\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160012\/frogblight-banker5.png\" alt=\"\" width=\"421\" height=\"201\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160012\/frogblight-banker5.png 421w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160012\/frogblight-banker5-300x143.png 300w\" sizes=\"auto, (max-width: 421px) 100vw, 421px\"><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><center><strong><em>The app icon before (left) and after launching (right)<\/em><\/strong><\/center><br \/>\nIn the sample we review in this section, Frogblight uses a REST API for C2 communication, implemented using the Retrofit library. The malicious app pings the C2 server every two seconds in foreground, and if no error is returned, it calls the REST API client methods <code>fetchOutbox<\/code> and getFileCommands. Other methods are called when specific events occur, for example, after the device screen is turned on, the <code>com.capcuttup.refresh.PersistentService<\/code> foreground service is launched, or an SMS is received. The full list of all REST API client methods with parameters and descriptions is shown below.<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>REST API client method<\/strong><\/td>\n<td><strong>Description<\/strong><\/td>\n<td><strong>Parameters<\/strong><\/td>\n<\/tr>\n<tr>\n<td>fetchOutbox<\/td>\n<td>Request message content to be sent via SMS or displayed in a notification<\/td>\n<td>device_id: unique Android device ID<\/td>\n<\/tr>\n<tr>\n<td>ackOutbox<\/td>\n<td>Send the results of processing a message received after calling the API method fetchOutbox<\/td>\n<td>device_id: unique Android device ID<br \/>\nmsg_id: message ID<br \/>\nstatus: message processing status<br \/>\nerror: message processing error<\/td>\n<\/tr>\n<tr>\n<td>getAllPackages<\/td>\n<td>Request the names of app packages whose launch should open a website in WebView to capture user input data<\/td>\n<td>action: same as the API method name<\/td>\n<\/tr>\n<tr>\n<td>getPackageUrl<\/td>\n<td>Request the website URL that will be opened in WebView when the app with the specified package name is launched<\/td>\n<td>action: same as the API method name<br \/>\npackage: the package name of the target app<\/td>\n<\/tr>\n<tr>\n<td>getFileCommands<\/td>\n<td>Request commands for file operations<\/p>\n<p>Available commands:<br \/>\n\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 download: upload the target file to the C2<br \/>\n\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 generate_thumbnails: generate thumbnails from the image files in the target directory and upload them to the C2<br \/>\n\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 list: send information about all files in the target directory to the C2<br \/>\n\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 thumbnail: generate a thumbnail from the target image file and upload it to the C2<\/p>\n<\/td>\n<td>device_id: unique Android device ID<\/td>\n<\/tr>\n<tr>\n<td>pingDevice<\/td>\n<td>Check the C2 connection<\/td>\n<td>device_id: unique Android device ID<\/td>\n<\/tr>\n<tr>\n<td>reportHijackSuccess<\/td>\n<td>Send captured user input data from the website opened in a WebView when the app with the specified package name is launched<\/td>\n<td>action: same as the API method name<br \/>\npackage: the package name of the target app<br \/>\ndata: captured user input data<\/td>\n<\/tr>\n<tr>\n<td>saveAppList<\/td>\n<td>Send information about the apps installed on the device<\/td>\n<td>device_id: unique Android device ID app_list: a list of apps installed on the device<br \/>\napp_count: a count of apps installed on the device<\/td>\n<\/tr>\n<tr>\n<td>saveInjection<\/td>\n<td>Send captured user input data from the website opened in a WebView. If it was not opened following the launch of the target app, the app_name parameter is determined based on the opened URL<\/td>\n<td>device_id: unique Android device ID app_name: the package name of the target app<br \/>\nform_data: captured user input data<\/td>\n<\/tr>\n<tr>\n<td>savePermission<\/td>\n<td>Unused but presumably needed for sending information about permissions<\/td>\n<td>device_id: unique Android device ID permission_type: permission type<br \/>\nstatus: permission status<\/td>\n<\/tr>\n<tr>\n<td>sendSms<\/td>\n<td>Send information about an SMS message from the device<\/td>\n<td>device_id: unique Android device ID sender: the sender\u2019s\/recipient\u2019s phone number<br \/>\nmessage: message text<br \/>\ntimestamp: received\/sent time<br \/>\ntype: message type (inbox\/sent)<\/td>\n<\/tr>\n<tr>\n<td>sendTelegramMessage<\/td>\n<td>Send captured user input data from the webpages opened by Frogblight in WebView<\/td>\n<td>device_id: unique Android device ID<br \/>\nurl: website URL<br \/>\ntitle: website page title<br \/>\ninput_type: the type of user input data<br \/>\ninput_value: user input data<br \/>\nfinal_value: user input data with additional information<br \/>\ntimestamp: the time of data capture<br \/>\nip_address: user IP address<br \/>\nsms_permission: whether SMS permission is granted<br \/>\nfile_manager_permission: whether file access permission is granted<\/td>\n<\/tr>\n<tr>\n<td>updateDevice<\/td>\n<td>Send information about the device<\/td>\n<td>device_id: unique Android device ID<br \/>\nmodel: device manufacturer and model<br \/>\nandroid_version: Android version<br \/>\nphone_number: user phone number<br \/>\nbattery: current battery level<br \/>\ncharging: device charging status<br \/>\nscreen_status: screen on\/off<br \/>\nip_address: user IP address<br \/>\nsms_permission: whether SMS permission is granted<br \/>\nfile_manager_permission: whether file access permission is granted<\/td>\n<\/tr>\n<tr>\n<td>updatePermissionStatus<\/td>\n<td>Send information about permissions<\/td>\n<td>device_id: unique Android device ID<br \/>\npermission_type: permission type<br \/>\nstatus: permission status<br \/>\ntimestamp: current time<\/td>\n<\/tr>\n<tr>\n<td>uploadBatchThumbnails<\/td>\n<td>Upload thumbnails to the C2<\/td>\n<td>device_id: unique Android device ID<br \/>\nthumbnails: thumbnails<\/td>\n<\/tr>\n<tr>\n<td>uploadFile<\/td>\n<td>Upload a file to the C2<\/td>\n<td>device_id: unique Android device ID<br \/>\nfile_path: file path<br \/>\ndownload_id: the file ID on the C2<br \/>\nThe file itself is sent as an unnamed parameter<\/td>\n<\/tr>\n<tr>\n<td>uploadFileList<\/td>\n<td>Send information about all files in the target directory<\/td>\n<td>device_id: unique Android device ID<br \/>\npath: directory path<br \/>\nfile_list: information about the files in the target directory<\/td>\n<\/tr>\n<tr>\n<td>uploadFileListLog<\/td>\n<td>Send information about all files in the target directory to an endpoint different from uploadFileList<\/td>\n<td>device_id: unique Android device ID<br \/>\npath: directory path<br \/>\nfile_list: information about the files in the target directory<\/td>\n<\/tr>\n<tr>\n<td>uploadThumbnailLog<\/td>\n<td>Unused but presumably needed for uploading thumbnails to an endpoint different from uploadBatchThumbnails<\/td>\n<td>device_id: unique Android device ID<br \/>\nthumbnails: thumbnails<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4 id=\"remote-device-control-persistence-and-protection-against-deletion\">Remote device control, persistence, and protection against deletion<\/h4>\n<p>The app includes several classes to provide the threat actor with remote access to the infected device, gain persistence, and protect the malicious app from being deleted.<\/p>\n<ul>\n<li><code>capcuttup.refresh.AccessibilityAutoClickService<\/code><br \/>\nThis is intended to prevent removal of the app and to open websites specified by the threat actor in WebView upon target apps startup. It is present in the sample we review, but is no longer in use and deleted in further versions.<\/li>\n<li><code>capcuttup.refresh.PersistentService<\/code><br \/>\nThis is a service whose main purpose is to interact with the C2 and to make malicious tasks persistent.<\/li>\n<li><code>capcuttup.refresh.BootReceiver<\/code><br \/>\nThis is a broadcast receiver responsible for setting up the persistence mechanisms, such as job scheduling and setting alarms, after device boot completion.<\/li>\n<\/ul>\n<h3 id=\"further-development\">Further development<\/h3>\n<p>In later versions, new functionality was added, and some of the more recent Frogblight variants disguised themselves as the Chrome browser. Let\u2019s look at one of the fake Chrome samples (<code>d7d15e02a9cd94c8ab00c043aef55aff<\/code>).<\/p>\n<p>In this sample, new REST API client methods have been added for interacting with the C2.<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>REST API client method<\/strong><\/td>\n<td><strong>Description<\/strong><\/td>\n<td><strong>Parameters<\/strong><\/td>\n<\/tr>\n<tr>\n<td>getContactCommands<\/td>\n<td>Get commands to perform actions with contacts<br \/>\nAvailable commands:<br \/>\n\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 ADD_CONTACT: add a contact to the user device<br \/>\n\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 DELETE_CONTACT: delete a contact from the user device<br \/>\n\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 EDIT_CONTACT: edit a contact on the user device<\/td>\n<td>device_id: unique Android device ID<\/td>\n<\/tr>\n<tr>\n<td>sendCallLogs<\/td>\n<td>Send call logs to the C2<\/td>\n<td>device_id: unique Android device ID<br \/>\ncall_logs: call log data<\/td>\n<\/tr>\n<tr>\n<td>sendNotificationLogs<\/td>\n<td>Send notifications log to the C2. Not fully implemented in this sample, and as of the time of writing this report, we hadn\u2019t seen any samples with a full-fledged implementation of this API method<\/td>\n<td>action: same as the API method name<br \/>\nnotifications: notification log data<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Also, the threat actor had implemented a custom input method for recording keystrokes to a file using the <code>com.puzzlesnap.quickgame.CustomKeyboardService<\/code> service.<\/p>\n<p>Another Frogblight sample we observed trying to avoid emulators and using geofencing techniques is <code>115fbdc312edd4696d6330a62c181f35<\/code>. In this sample, Frogblight checks the environment (for example, device model) and shuts down if it detects an emulator or if the device is located in the United States.<\/p>\n<div id=\"attachment_118446\" style=\"width: 528px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160140\/frogblight-banker6.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118446\" class=\"size-full wp-image-118446\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160140\/frogblight-banker6.png\" alt=\"Part of the code responsible for avoiding Frogblight running in an undesirable environment\" width=\"518\" height=\"251\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160140\/frogblight-banker6.png 518w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160140\/frogblight-banker6-300x145.png 300w\" sizes=\"auto, (max-width: 518px) 100vw, 518px\"><\/a><\/p>\n<p id=\"caption-attachment-118446\" class=\"wp-caption-text\">Part of the code responsible for avoiding Frogblight running in an undesirable environment<\/p>\n<\/div>\n<p>Later on, the threat actor decided to start using a web socket instead of the REST API. Let\u2019s see an example of this in one of the recent samples (<code>08a3b1fb2d1abbdbdd60feb8411a12c7<\/code>). This sample is disguised as an app for receiving social support via an official government webpage. The feature set of this sample is very similar to the previous ones, with several new capabilities added. Commands are transmitted over a web socket using the JSON format. A command template is shown below:<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">{\r\n    \"id\": &lt;command ID&gt;,\r\n    \"command_type\": &lt;command name&gt;\r\n    \"command_data\": &lt;command data&gt;\r\n}<\/pre>\n<p>\nIt is also worth noting that some commands in this version share the same meaning but have different structures, and the functionality of certain commands has not been fully implemented yet. This indicates that Frogblight was under active development at the time of our research, and since no its activity was noticed after September, it is possible that the malware is being finalized to a fully operational state before continuing to infect users\u2019 devices. A full list of commands with their parameters and description is shown below:<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Command<\/strong><\/td>\n<td><strong>Description<\/strong><\/td>\n<td><strong>Parameters<\/strong><\/td>\n<\/tr>\n<tr>\n<td>connect<\/td>\n<td>Send a registration message to the C2<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>connection_success<\/td>\n<td>Send various information, such as call logs, to the C2; start pinging the C2 and requesting commands<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>auth_error<\/td>\n<td>Log info about an invalid login key to the Android log system<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>pong_device<\/td>\n<td><em>Does nothing<\/em><\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>commands_list<\/td>\n<td>Execute commands<\/td>\n<td>List of commands<\/td>\n<\/tr>\n<tr>\n<td>sms_send_command<\/td>\n<td>Send an arbitrary SMS message<\/td>\n<td>recipient: message destination<br \/>\nmessage: message text<br \/>\nmsg_id: message ID<\/td>\n<\/tr>\n<tr>\n<td>bulk_sms_command<\/td>\n<td>Send an arbitrary SMS message to multiple recipients<\/td>\n<td>recipients: message destinations<br \/>\nmessage: message text<\/td>\n<\/tr>\n<tr>\n<td>get_contacts_command<\/td>\n<td>Send all contacts to the C2<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>get_app_list_command<\/td>\n<td>Send information about the apps installed on the device to the C2<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>get_files_command<\/td>\n<td>Send information about all files in certain directories to the C2<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>get_call_logs_command<\/td>\n<td>Send call logs to the C2<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>get_notifications_command<\/td>\n<td>Send a notifications log to the C2. This is not fully implemented in the sample at hand, and as of the time of writing this report, we hadn\u2019t seen any samples with a full-fledged implementation of this command<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>take_screenshot_command<\/td>\n<td>Take a screenshot. This is not fully implemented in the sample at hand, and as of the time of writing this report, we hadn\u2019t seen any samples with a full-fledged implementation of this command<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>update_device<\/td>\n<td>Send registration message to the C2<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>new_webview_data<\/td>\n<td>Collect WebView data. This is not fully implemented in the sample at hand, and as of the time of writing this report, we hadn\u2019t seen any samples with a full-fledged implementation of this command<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>new_injection<\/td>\n<td>Inject code. This is not fully implemented in the sample at hand, and as of the time of writing this report, we hadn\u2019t seen any samples with a full-fledged implementation of this command<\/td>\n<td>code: injected code<br \/>\ntarget_app: presumably the package name of the target app<\/td>\n<\/tr>\n<tr>\n<td>add_contact_command<\/td>\n<td>Add a contact to the user device<\/td>\n<td>name: contact name<br \/>\nphone: contact phone<br \/>\nemail: contact email<\/td>\n<\/tr>\n<tr>\n<td>contact_add<\/td>\n<td>Add a contact to the user device<\/td>\n<td>display_name: contact name<br \/>\nphone_number: contact phone<br \/>\nemail: contact email<\/td>\n<\/tr>\n<tr>\n<td>contact_delete<\/td>\n<td>Delete a contact from the user device<\/td>\n<td>phone_number: contact phone<\/td>\n<\/tr>\n<tr>\n<td>contact_edit<\/td>\n<td>Edit a contact on the user device<\/td>\n<td>display_name: new contact name<br \/>\nphone_number: contact phone<br \/>\nemail: new contact email<\/td>\n<\/tr>\n<tr>\n<td>contact_list<\/td>\n<td>Send all contacts to the C2<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>file_list<\/td>\n<td>Send information about all files in the specified directory to the C2<\/td>\n<td>path: directory path<\/td>\n<\/tr>\n<tr>\n<td>file_download<\/td>\n<td>Upload the specified file to the C2<\/td>\n<td>file_path: file path<br \/>\ndownload_id: an ID that is received with the command and sent back to the C2 along with the requested file. Most likely, this is used to organize data on the C2<\/td>\n<\/tr>\n<tr>\n<td>file_thumbnail<\/td>\n<td>Generate a thumbnail from the target image file and upload it to the C2<\/td>\n<td>file_path: image file path<\/td>\n<\/tr>\n<tr>\n<td>file_thumbnails<\/td>\n<td>Generate thumbnails from the image files in the target directory and upload them to the C2<\/td>\n<td>folder_path: directory path<\/td>\n<\/tr>\n<tr>\n<td>health_check<\/td>\n<td>Send information about the current device state: battery level, screen state, and so on<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>message_list_request<\/td>\n<td>Send all SMS messages to the C2<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>notification_send<\/td>\n<td>Show an arbitrary notification<\/td>\n<td>title: notification title<br \/>\nmessage: notification message<br \/>\napp_name: notification subtext<\/td>\n<\/tr>\n<tr>\n<td>package_list_response<\/td>\n<td>Save the target package names<\/td>\n<td>packages: a list of all target package names.<br \/>\nEach list element contains:<br \/>\npackage_name: target package name<br \/>\nactive: whether targeting is active<\/td>\n<\/tr>\n<tr>\n<td>delete_contact_command<\/td>\n<td>Delete a contact from the user device. This is not fully implemented in the sample at hand, and as of the time of writing this report, we hadn\u2019t seen any samples with a full-fledged implementation of this command<\/td>\n<td>contact_id: contact ID<br \/>\nname: contact name<\/td>\n<\/tr>\n<tr>\n<td>file_upload_command<\/td>\n<td>Upload specified file to the C2. This is not fully implemented in the sample at hand, and as of the time of writing this report, we hadn\u2019t seen any samples with a full-fledged implementation of this command<\/td>\n<td>file_path: file path<br \/>\nfile_name: file name<\/td>\n<\/tr>\n<tr>\n<td>file_download_command<\/td>\n<td>Download file to user device. This is not fully implemented in the sample at hand, and as of the time of writing this report, we hadn\u2019t seen any samples with a full-fledged implementation of this command<\/td>\n<td>file_url: the URL of the file to download<br \/>\ndownload_path: download path<\/td>\n<\/tr>\n<tr>\n<td>download_file_command<\/td>\n<td>Download file to user device. This is not fully implemented in the sample at hand, and as of the time of writing this report, we hadn\u2019t seen any samples with a full-fledged implementation of this command<\/td>\n<td>file_url: the URL of the file to download<br \/>\ndownload_path: downloading path<\/td>\n<\/tr>\n<tr>\n<td>get_permissions_command<\/td>\n<td>Send a registration message to the C2, including info about specific permissions<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>health_check_command<\/td>\n<td>Send information about the current device state, such as battery level, screen state, and so on<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>connect_error<\/td>\n<td>Log info about connection errors to the Android log system<\/td>\n<td>A list of errors<\/td>\n<\/tr>\n<tr>\n<td>reconnect<\/td>\n<td>Send a registration message to the C2<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<tr>\n<td>disconnect<\/td>\n<td>Stop pinging the C2 and requesting commands from it<\/td>\n<td>\u2013<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Authentication via WebSocket takes place using a special key.<\/p>\n<div id=\"attachment_118447\" style=\"width: 568px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160218\/frogblight-banker7.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118447\" class=\"size-full wp-image-118447\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160218\/frogblight-banker7.png\" alt=\"The part of the code responsible for the WebSocket authentication logic\" width=\"558\" height=\"94\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160218\/frogblight-banker7.png 558w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160218\/frogblight-banker7-300x51.png 300w\" sizes=\"auto, (max-width: 558px) 100vw, 558px\"><\/a><\/p>\n<p id=\"caption-attachment-118447\" class=\"wp-caption-text\">The part of the code responsible for the WebSocket authentication logic<\/p>\n<\/div>\n<p>At the IP address to which the WebSocket connection was made, the Frogblight web panel was accessible, which accepted the authentication key mentioned above. Since only samples using the same key as the webpanel login are controllable through it, we suggest that Frogblight might be distributed under the MaaS model.<\/p>\n<div id=\"attachment_118448\" style=\"width: 1134px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160313\/frogblight-banker8.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118448\" class=\"size-full wp-image-118448\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160313\/frogblight-banker8.png\" alt=\"The interface of the sign-in screen for the Frogblight web panel\" width=\"1124\" height=\"640\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160313\/frogblight-banker8.png 1124w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160313\/frogblight-banker8-300x171.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160313\/frogblight-banker8-1024x583.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160313\/frogblight-banker8-768x437.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160313\/frogblight-banker8-615x350.png 615w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160313\/frogblight-banker8-740x421.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160313\/frogblight-banker8-492x280.png 492w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12160313\/frogblight-banker8-800x456.png 800w\" sizes=\"auto, (max-width: 1124px) 100vw, 1124px\"><\/a><\/p>\n<p id=\"caption-attachment-118448\" class=\"wp-caption-text\">The interface of the sign-in screen for the Frogblight web panel<\/p>\n<\/div>\n<p>Judging by the menu options, the threat actor can sort victims\u2019 devices by certain parameters, such as the presence of banking apps on the device, and send bulk SMS messages and perform other mass actions.<\/p>\n<h2 id=\"victims\">Victims<\/h2>\n<p>Since some versions of Frogblight opened the Turkish government webpage to collect user-entered data on Turkish banks\u2019 websites, we assume with high confidence that it is aimed mainly at users from Turkey. Also, based on our telemetry, the majority of users attacked by Frogblight are located in that country.<\/p>\n<h2 id=\"attribution\">Attribution<\/h2>\n<p>Even though it is not possible to provide an attribution to any known threat actor based on the information available, during our analysis of the Frogblight Android malware and the search for online mentions of the names it uses, we discovered a GitHub profile containing repos with Frogblight, which had also created repos with Coper malware, distributed under the MaaS model. It is possible that this profile belongs to the attackers distributing Coper who have also started distributing Frogblight.<\/p>\n<div id=\"attachment_118449\" style=\"width: 1443px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12171338\/frogblight-banker9.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118449\" class=\"size-full wp-image-118449\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12171338\/frogblight-banker9.png\" alt=\"GitHub repositories containing Frogblight and Coper malware\" width=\"1433\" height=\"1027\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12171338\/frogblight-banker9.png 1433w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12171338\/frogblight-banker9-300x215.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12171338\/frogblight-banker9-1024x734.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12171338\/frogblight-banker9-768x550.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12171338\/frogblight-banker9-488x350.png 488w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12171338\/frogblight-banker9-740x530.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12171338\/frogblight-banker9-391x280.png 391w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12171338\/frogblight-banker9-800x573.png 800w\" sizes=\"auto, (max-width: 1433px) 100vw, 1433px\"><\/a><\/p>\n<p id=\"caption-attachment-118449\" class=\"wp-caption-text\">GitHub repositories containing Frogblight and Coper malware<\/p>\n<\/div>\n<p>Also, since the comments in the Frogblight code are written in Turkish, we believe that its developers speak this language.<\/p>\n<h2 id=\"conclusions\">Conclusions<\/h2>\n<p>The new Android malware we dubbed \u201cFrogblight\u201d appeared recently and targets mainly users from Turkey. This is an advanced banking Trojan aimed at stealing money. It has already infected real users\u2019 devices, and it doesn\u2019t stop there, adding more and more new features in the new versions that appear. It can be made more dangerous by the fact that it may be used by attackers who already have experience distributing malware. We will continue to monitor its development.<\/p>\n<h2 id=\"indicators-of-compromise\">Indicators of Compromise<\/h2>\n<p><em>More indicators of compromise, as well as any updates to these, are available to the customers of our <a href=\"https:\/\/www.kaspersky.ru\/enterprise-security\/threat-intelligence?icid=gl_sl_ti-lnk_sm-team_5c57875226809663\" target=\"_blank\" rel=\"noopener\">crimeware reporting service<\/a>. If you are interested, please contact <a href=\"mailto:crimewareintel@kaspersky.com\">crimewareintel@kaspersky.com<\/a>.<\/em><\/p>\n<p><strong>APK file hashes<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/8483037dcbf14ad8197e7b23b04aea34\/?icid=gl_sl_opentip-lnk_sm-team_16e75be0bd6ffc4b&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">8483037dcbf14ad8197e7b23b04aea34<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/105fa36e6f97977587a8298abc31282a\/?icid=gl_sl_opentip-lnk_sm-team_18bdb8385eeee5ae&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">105fa36e6f97977587a8298abc31282a<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/e1cd59ae3995309627b6ab3ae8071e80\/?icid=gl_sl_opentip-lnk_sm-team_4a75b39a43f07d3a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">e1cd59ae3995309627b6ab3ae8071e80<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/115fbdc312edd4696d6330a62c181f35\/?icid=gl_sl_opentip-lnk_sm-team_4a79b07636dcca9d&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">115fbdc312edd4696d6330a62c181f35<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/08a3b1fb2d1abbdbdd60feb8411a12c7\/?icid=gl_sl_opentip-lnk_sm-team_69e1fc8ae6063212&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">08a3b1fb2d1abbdbdd60feb8411a12c7<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/d7d15e02a9cd94c8ab00c043aef55aff\/?icid=gl_sl_opentip-lnk_sm-team_81a0bc4f4b1808aa&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">d7d15e02a9cd94c8ab00c043aef55aff<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/9dac23203c12abd60d03e3d26d372253\/?icid=gl_sl_opentip-lnk_sm-team_09faa4001cf9166b&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">9dac23203c12abd60d03e3d26d372253<\/a><\/p>\n<p><strong>C2 domains<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/1249124fr1241og5121.sa.com\/?icid=gl_sl_opentip-lnk_sm-team_626a109de6b02547&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">1249124fr1241og5121.sa[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/froglive.net\/?icid=gl_sl_opentip-lnk_sm-team_e398d0855e754373&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">froglive[.]net<\/a><\/p>\n<p><strong>C2 IPs<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/45.138.16.208\/?icid=gl_sl_opentip-lnk_sm-team_3fdc3763874e4a52&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">45.138.16.208[:]8080<\/a><\/p>\n<p><strong>URL of GitHub repository with Frogblight phishing website source code<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/https%3A%2F%2Fgithub.com%2Feraykarakaya0020%2Fe-ifade-vercel\/?icid=gl_sl_opentip-lnk_sm-team_887fcbcb699e1e20&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">https:\/\/github[.]com\/eraykarakaya0020\/e-ifade-vercel<\/a><\/p>\n<p><strong>URL of GitHub account containing APK files of Frogblight and Coper<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/https%3A%2F%2Fgithub.com%2Fchromeapk\/?icid=gl_sl_opentip-lnk_sm-team_8ab0fa5de09d8dee&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">https:\/\/github[.]com\/Chromeapk<\/a><\/p>\n<p><strong>Distribution URLs<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/https%3A%2F%2Ffarketmez37.cfd%2Fe-ifade.apk\/?icid=gl_sl_opentip-lnk_sm-team_f3df59f29388d61e&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">https:\/\/farketmez37[.]cfd\/e-ifade.apk<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/https%3A%2F%2Ffarketmez36.sbs%2Fe-ifade.apk\/?icid=gl_sl_opentip-lnk_sm-team_abe49cd23a479508&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">https:\/\/farketmez36[.]sbs\/e-ifade.apk<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/https%3A%2F%2Fe-ifade-app-5gheb8jc.devinapps.com%2Fe-ifade.apk\/?icid=gl_sl_opentip-lnk_sm-team_3b86aeed7c50541a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\">https:\/\/e-ifade-app-5gheb8jc.devinapps[.]com\/e-ifade.apk<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In August 2025, we discovered a campaign targeting individuals in Turkey with a new Android banking Trojan we dubbed \u201cFrogblight\u201d. Initially, the malware was disguised as an app for accessing court case files via an official government webpage. Later, more universal disguises appeared, such as the Chrome browser. Frogblight can use official government websites as [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[90,237,240,239,99,232,233,238,234,236,235],"tags":[91],"class_list":["post-177","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-financial-malware","category-financial-threats","category-frogblight","category-malware","category-malware-descriptions","category-malware-technologies","category-sms","category-sms-trojan","category-trojan","category-trojan-banker","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Frogblight threatens you with a court case: a new Android banker targets Turkish users - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Frogblight threatens you with a court case: a new Android banker targets Turkish users - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"In August 2025, we discovered a campaign targeting individuals in Turkey with a new Android banking Trojan we dubbed \u201cFrogblight\u201d. Initially, the malware was disguised as an app for accessing court case files via an official government webpage. Later, more universal disguises appeared, such as the Chrome browser. Frogblight can use official government websites as [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-19T09:15:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12211937\/SL-Frogblight-featured-990x400.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"18 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Frogblight threatens you with a court case: a new Android banker targets Turkish users\",\"datePublished\":\"2025-12-19T09:15:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/\"},\"wordCount\":3453,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12211937\/SL-Frogblight-featured-990x400.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\",\"Financial malware\",\"Financial threats\",\"Frogblight\",\"Malware\",\"Malware descriptions\",\"Malware Technologies\",\"SMS\",\"SMS Trojan\",\"Trojan\",\"Trojan Banker\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/\",\"name\":\"Frogblight threatens you with a court case: a new Android banker targets Turkish users - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12211937\/SL-Frogblight-featured-990x400.jpg\",\"datePublished\":\"2025-12-19T09:15:25+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/#primaryimage\",\"url\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12211937\/SL-Frogblight-featured-990x400.jpg\",\"contentUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12211937\/SL-Frogblight-featured-990x400.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Frogblight threatens you with a court case: a new Android banker targets Turkish users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Frogblight threatens you with a court case: a new Android banker targets Turkish users - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/","og_locale":"en_US","og_type":"article","og_title":"Frogblight threatens you with a court case: a new Android banker targets Turkish users - Imperative Business Ventures Limited","og_description":"In August 2025, we discovered a campaign targeting individuals in Turkey with a new Android banking Trojan we dubbed \u201cFrogblight\u201d. Initially, the malware was disguised as an app for accessing court case files via an official government webpage. Later, more universal disguises appeared, such as the Chrome browser. Frogblight can use official government websites as [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2025-12-19T09:15:25+00:00","og_image":[{"url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12211937\/SL-Frogblight-featured-990x400.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"18 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Frogblight threatens you with a court case: a new Android banker targets Turkish users","datePublished":"2025-12-19T09:15:25+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/"},"wordCount":3453,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12211937\/SL-Frogblight-featured-990x400.jpg","keywords":["Cybersecurity"],"articleSection":["Cybersecurity","Financial malware","Financial threats","Frogblight","Malware","Malware descriptions","Malware Technologies","SMS","SMS Trojan","Trojan","Trojan Banker"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/","url":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/","name":"Frogblight threatens you with a court case: a new Android banker targets Turkish users - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12211937\/SL-Frogblight-featured-990x400.jpg","datePublished":"2025-12-19T09:15:25+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/#primaryimage","url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12211937\/SL-Frogblight-featured-990x400.jpg","contentUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/12211937\/SL-Frogblight-featured-990x400.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/frogblight-threatens-you-with-a-court-case-a-new-android-banker-targets-turkish-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Frogblight threatens you with a court case: a new Android banker targets Turkish users"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=177"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/177\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}