BREAKINGON

Beware of ClayRat: The New Android Spyware Posing as Popular Apps

10/10/2025
A new Android spyware named ClayRat is deceiving users by mimicking popular apps. Targeting Russian users, it steals sensitive data and propagates through compromised devices. Discover how it operates and what you can do to protect yourself!
Beware of ClayRat: The New Android Spyware Posing as Popular Apps
ClayRat spyware is infiltrating Android devices by posing as popular apps. Learn how it steals data and spreads through users' contacts.

New Android Spyware ClayRat Poses as Popular Apps

A new Android spyware named ClayRat is deceiving potential victims by masquerading as widely used applications and services such as WhatsApp, Google Photos, TikTok, and YouTube. This sophisticated malware is primarily targeting users in Russia through Telegram channels and fraudulent websites that appear to be legitimate. ClayRat has the capability to steal sensitive information, including SMS messages, call logs, and notifications, while also being able to take pictures and make phone calls without the user's knowledge.

Insights from Malware Researchers

Researchers from mobile security firm Zimperium have reported documenting over 600 samples of ClayRat and more than 50 distinct droppers within the last three months, highlighting an active effort by the attackers to expand their operations. This extensive campaign indicates a well-coordinated approach to infiltrate devices and gather personal data from unsuspecting users.

The ClayRat Campaign Explained

The ClayRat campaign derives its name from the malware's command and control (C2) server. It employs meticulously designed phishing portals and registered domains that closely imitate genuine service pages. These fraudulent sites either host or redirect visitors to Telegram channels where unsuspecting victims can download Android Package Files (APKs).

To enhance the appearance of legitimacy, the threat actors have implemented various tactics, such as adding fake comments, inflating download counts, and creating a deceptive Play Store-like user experience with step-by-step instructions on how to sideload APKs while bypassing Android’s security warnings. Some samples of ClayRat operate as droppers, presenting users with a fake Play Store update screen while secretly hiding an encrypted payload in the app's assets.

Bypassing Security Measures

ClayRat employs a “session-based” installation method to infiltrate devices, which is designed to bypass restrictions present in Android 13 and later versions. This method lowers the perceived risk associated with installation, thus increasing the likelihood that users will unwittingly install the spyware after visiting a compromised webpage.

Spyware Capabilities of ClayRat

Once installed, ClayRat can utilize the infected device to propagate itself further by sending SMS messages to the victim’s contact list. The spyware assumes the role of the default SMS handler on compromised devices, allowing it to read all incoming and stored SMS messages, intercept them before other applications can, and modify SMS databases.

Communication and Commands

The spyware establishes communication with its C2 server, with connections encrypted using AES-GCM in its latest versions. It is designed to receive one of twelve supported commands, including:

get_apps_list — Sends a list of installed apps to the C2. get_calls — Sends call logs. get_camera — Takes a front-camera photo and sends it to the server. get_sms_list — Exfiltrates SMS messages. messsms — Sends mass SMS to all contacts. send_sms/make_call — Sends SMS or places calls from the device. notifications/get_push_notifications — Captures notifications and pushes data. get_device_info — Collects information about the device. get_proxy_data — Fetches a proxy WebSocket URL, appends device ID, and initializes a connection object. retransmission — Resends an SMS to a number received from the C2.

After obtaining the necessary permissions, the spyware can automatically harvest contacts and programmatically compose and send SMS messages to every contact, allowing for widespread propagation.

Protective Measures and Conclusion

As a member of the App Defense Alliance, Zimperium has shared the complete indicators of compromise (IoCs) with Google. Consequently, Play Protect now actively blocks both known and new variants of the ClayRat spyware. Despite these protective measures, researchers emphasize that the ClayRat campaign is extensive, with over 600 documented samples in just three months, highlighting the urgent need for users to be vigilant and cautious when downloading apps and clicking on links.

Breakingon.com is an independent news platform that delivers the latest news, trends, and analyses quickly and objectively. We gather and present the most important developments from around the world and local sources with accuracy and reliability. Our goal is to provide our readers with factual, unbiased, and comprehensive news content, making information easily accessible. Stay informed with us!
© Copyright 2025 BreakingOn. All rights reserved.