Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Android Malware Frogblight Mimics as Official Government Websites to Collect SMS and Device Details

New Android Malware Frogblight Mimics as Official Government Websites to Collect SMS and Device Details

Posted on December 15, 2025December 15, 2025 By CWS

A complicated Android banking Trojan named Frogblight has emerged as a big risk focusing on Turkish customers, using misleading techniques to steal banking credentials and private information.

Found in August 2025, this malware initially disguised itself as an software for accessing court docket case recordsdata via official authorities portals earlier than evolving into extra generic kinds mimicking common purposes like Chrome.

The malware operates via a well-coordinated social engineering method. Victims obtain phishing SMS messages falsely claiming involvement in court docket instances, with hyperlinks directing them to pretend authorities web sites designed to distribute the malicious software.

As soon as put in, Frogblight requests entry to delicate permissions, together with SMS learn and write capabilities, storage entry, and machine info retrieval.

The deception continues when customers launch the app, because it shows reliable authorities webpages via an embedded browser view to create a false sense of authenticity.

The phishing web site distributing Frogblight (Supply – Securelist)

Securelist analysts recognized that Frogblight operates as a multifunctional risk with banking theft capabilities mixed with in depth spy ware features.

The malware actively displays and information SMS messages, tracks put in purposes, displays the machine filesystem, and may ship arbitrary textual content messages to exterior contacts.

Maybe most regarding, the malware demonstrates energetic growth, with new options added all through September 2025, suggesting potential distribution underneath a Malware-as-a-Service mannequin.

The Injection Mechanism and Command Structure

The core an infection mechanism depends on JavaScript code injection inside the compromised WebView atmosphere. When customers work together with the pretend authorities portal displayed contained in the malicious software, Frogblight silently captures all consumer inputs.

The app icon earlier than (left) and after launching (proper) (Supply – Securelist)

The malware particularly targets on-line banking sign-in makes an attempt by mechanically initiating banking login screens after a short two-second delay, no matter consumer choice.

Communication with the command-and-control server happens via REST API calls utilizing the Retrofit library, with the malware pinging its controller each two seconds when energetic.

Early variations used REST API endpoints dealing with duties like fetching outbox messages, acknowledging command execution, and importing stolen recordsdata and information.

Later variants transitioned to WebSocket connections utilizing JSON-formatted instructions for enhanced stealth and persistence.

The malware implements subtle persistence mechanisms via a number of Android companies. The AccessibilityAutoClickService prevents software removing whereas opening attacker-specified web sites.

The PersistentService handles ongoing command-and-control interactions, whereas the BootReceiver ensures malware persistence after machine restarts via job scheduling and alarm configuration.

The interface of the sign-in display for the Frogblight internet panel (Supply – Securelist)

Frogblight demonstrates extra evasion methods by detecting emulator environments and geofencing mechanisms that disable performance in the USA.

The appliance icon adjustments to “Davalarım” (a Turkish phrase) on newer Android variations whereas remaining hidden on older programs.

Detection signatures embrace HEUR:Trojan-Banker.AndroidOS.Frogblight and associated variants in Kaspersky merchandise, serving to safety groups determine and block this rising risk.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Android, Collect, Details, Device, Frogblight, Government, Malware, Mimics, Official, SMS, Websites

Post navigation

Previous Post: NVIDIA Merlin Vulnerabilities Let Attackers Execute Malicious Code and Trigger DoS Condition
Next Post: Threat Actors Advertising ‘MioLab MacOS’ Infostealer on an Underground Forum

Related Posts

Huge Surge in Fake Investment Platforms Mimic Forex Exchanges Steal Logins Huge Surge in Fake Investment Platforms Mimic Forex Exchanges Steal Logins Cyber Security News
Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery Cyber Security News
DNN Vulnerability Let Attackers Steal NTLM Credentials via Unicode Normalization Bypass DNN Vulnerability Let Attackers Steal NTLM Credentials via Unicode Normalization Bypass Cyber Security News
New DefenderWrite Tool Let Attackers Inject Malicious DLLs into AV Executable Folders New DefenderWrite Tool Let Attackers Inject Malicious DLLs into AV Executable Folders Cyber Security News
U.S. Government Seizes Online Marketplaces Used to Sell Fraudulent Identity Documents to Cybercriminals U.S. Government Seizes Online Marketplaces Used to Sell Fraudulent Identity Documents to Cybercriminals Cyber Security News
APT28 With Weaponized Office Documents Delivers BeardShell and Covenant Modules APT28 With Weaponized Office Documents Delivers BeardShell and Covenant Modules Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News