Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Frogblight banking Trojan targets Android users in Turkey

0
Medium
Published: Mon Dec 15 2025 (12/15/2025, 13:00:24 UTC)
Source: AlienVault OTX General

Description

Frogblight is a medium-severity Android banking Trojan primarily targeting users in Turkey. It masquerades as legitimate apps, initially as a court case file viewer and later as common apps like Chrome, to trick victims into installation. The malware steals banking credentials via official government websites and has extensive spyware capabilities, including SMS interception, app enumeration, device info collection, and sending arbitrary SMS messages. It employs advanced persistence and anti-deletion techniques and is distributed mainly through smishing campaigns exploiting legal concerns. Although currently focused on Turkey, its sophisticated remote control features and ongoing development pose risks if it spreads. No CVSS score exists, but the threat impacts confidentiality and integrity significantly with moderate ease of exploitation and no user interaction beyond initial install. European organizations with Turkish-speaking users or business ties should monitor for potential spillover. Mitigations include user education on smishing, app installation restrictions, SMS monitoring, and enhanced mobile endpoint protection.

AI-Powered Analysis

AILast updated: 12/15/2025, 18:00:32 UTC

Technical Analysis

Frogblight is a recently identified Android banking Trojan targeting Turkish users, discovered in late 2025. It initially disguises itself as an app for accessing court case files, leveraging the fear and urgency associated with legal matters to lure victims. Subsequently, it has adopted more generic disguises such as the Chrome browser to broaden its appeal. The Trojan is capable of stealing banking credentials by intercepting user interactions with official government websites, indicating sophisticated web overlay or phishing techniques. Beyond credential theft, Frogblight functions as spyware: it collects SMS messages, enumerates installed applications, gathers device information, and can send arbitrary SMS messages, potentially to premium numbers or for further propagation. The malware demonstrates advanced persistence mechanisms to survive device reboots and employs anti-deletion protections to hinder removal. Distribution is primarily via smishing attacks, where victims receive convincing SMS messages that claim involvement in court cases, prompting them to install the malicious app. The malware is actively maintained and updated, suggesting an ongoing threat actor presence likely fluent in Turkish. Indicators include numerous file hashes and domains associated with command and control infrastructure. Although no known exploits in the wild have been reported, the Trojan’s capabilities and targeted social engineering make it a credible threat to Android users in Turkey and potentially beyond.

Potential Impact

For European organizations, the direct impact is currently limited due to the Trojan’s focus on Turkish users. However, organizations with employees or customers who are Turkish speakers or have business operations in Turkey could be at risk of credential theft and espionage via infected devices. The malware’s ability to steal banking credentials threatens financial confidentiality and could lead to fraudulent transactions or identity theft. Its spyware functions compromise user privacy and may expose sensitive communications and device data. The capability to send arbitrary SMS messages could be abused for financial fraud or spreading further infections. If the malware spreads beyond Turkey, it could impact Android users across Europe, especially in countries with significant Turkish diaspora populations such as Germany, France, and the Netherlands. The persistence and anti-deletion features complicate incident response and remediation efforts. Overall, the threat undermines trust in mobile banking and government-related mobile services, potentially disrupting business continuity and causing reputational damage.

Mitigation Recommendations

1. Implement targeted user awareness campaigns focusing on smishing threats, especially warning about messages related to legal or court matters. 2. Enforce strict app installation policies on corporate and BYOD Android devices, restricting installations to trusted sources such as the Google Play Store and blocking sideloading. 3. Deploy mobile endpoint protection solutions capable of detecting banking Trojans and spyware behaviors, including monitoring for suspicious SMS activity and unauthorized app permissions. 4. Monitor network traffic for communications with known Frogblight command and control domains and block these at the network perimeter. 5. Encourage users to verify any unexpected SMS messages claiming legal involvement through official channels before clicking links or installing apps. 6. Regularly update mobile OS and security patches to reduce exploitation of any underlying vulnerabilities. 7. Use mobile device management (MDM) solutions to enforce security policies, detect anomalies, and facilitate rapid remediation. 8. For organizations with Turkish-speaking users, provide localized security guidance and support. 9. Establish incident response procedures specifically for mobile malware infections, including forensic analysis and device wipe if necessary. 10. Collaborate with local cybersecurity authorities and threat intelligence sharing platforms to stay updated on Frogblight developments.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://securelist.com/frogblight-banker/118440"]
Adversary
null
Pulse Id
69400668a56942944e4dca3b
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash08a3b1fb2d1abbdbdd60feb8411a12c7
hash105fa36e6f97977587a8298abc31282a
hash115fbdc312edd4696d6330a62c181f35
hash8483037dcbf14ad8197e7b23b04aea34
hash9dac23203c12abd60d03e3d26d372253
hashd7d15e02a9cd94c8ab00c043aef55aff
hashe1cd59ae3995309627b6ab3ae8071e80
hash2e8f5d499e35fecca2055e629fa34fe7be508259
hash385ac4c82389d8a65b59451a1f72f292febb95a0
hash3dfe001b51a895c3bd7694fc7cc0a689ab55d71a
hash6f09476425903ffead3e937e44fc29ca396cd71e
hash97073584d25e93dba0cd46e165943d399ec30002
hashea01a2d29690e8225b758ea9348f00d0b7636caf
hash0ebac21f450785766437e4e5dcda121817b198786876744a52cba0627babd1a9
hash49172f48e354316d1db787a1df1955197e64664b4ed695ed8b5b4491e3167688
hashb50888244a4e71f049d6807658860447715e0dc1367bf90f48514e090dcc9fad
hashc9962e1f58876a9b9cae3b4bf52af3466141ecf16601f9b0558410232fc08207
hashe2b6283cb8878fdbb9d6a49b0c77fd2e6a116cf4b1d3ff67a0b0287946d1d865
hashfe36420caa309941dcd8ec2fab4da905b185b8fdad86d9383dcb46c859f66454

Domain

ValueDescriptionCopy
domainfarketmez36.sbs
domainfarketmez37.cfd
domainfroglive.net
domaine-ifade-app-5gheb8jc.devinapps.com
domaintrojan-spy.androidos.smsthief.de

Threat ID: 69404937d9bcdf3f3df4a5e6

Added to database: 12/15/2025, 5:45:27 PM

Last enriched: 12/15/2025, 6:00:32 PM

Last updated: 12/16/2025, 2:37:31 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats