Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»ClayRat Android Spyware Expands Capabilities
News

ClayRat Android Spyware Expands Capabilities

Team-CWDBy Team-CWDDecember 8, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new iteration of the ClayRat Android spyware featuring expanded surveillance and device-control functions has been identified by cybersecurity researchers.

First seen in October, ClayRat was originally capable of stealing SMS messages, call logs and photos, as well as sending mass texts.

The latest version introduces far broader capabilities by combining Default SMS privileges with extensive abuse of Accessibility Services.

Improved Automation and Keylogging Capabilities

According to a new advisory from Zimperium, the spyware now performs a wide range of automated actions that enable near-total control of an infected device. 

Key functions include a keylogger that captures PINs, passwords and patterns.

The update also includes full screen recording through the MediaProjection API, overlays that disguise malicious activity and automated taps designed to block users from shutting down the device or deleting the app. These enhancements make the malware more persistent than earlier versions.

Read more on Android malware trends: New Android Albiriox Malware Gains Traction in Dark Web Markets

The team reported that the spyware also mimics well-known services, including global video platforms and regional taxi or parking apps.

More than 700 unique APKs have been found, distributed through phishing sites and platforms like Dropbox.

Researchers have observed over 25 active phishing domains, including sites impersonating YouTube and a car diagnostics tool.

How ClayRat Operates

Once installed, ClayRat prompts users to grant SMS control and then guides them to enable Accessibility Services.

After permissions are granted, it automatically disables the Play Store to bypass Google Play Protect. In addition, its credential-theft process monitors lock-screen activity to reconstruct PIN, password or pattern entries, which are then stored and used to unlock the device through automated gestures.

The spyware also collects replies to fake notifications and harvests active alerts.

To maintain user deception and steal sensitive information, ClayRat deploys several overlays, such as black screens or fake system-update prompts.

Zimperium warned that the campaign poses a serious risk to enterprises because it targets notifications, SMS flows, authentication prompts and screen content.

“In BYOD environments, common across modern workforces, a single infected device can become a conduit for data theft, fraud, and unauthorized access to corporate systems,” the company warned.

“As ClayRat continues to evolve, expanding its spyware, remote-control and lock-screen manipulation capabilities, organizations require mobile security that operates at the device level and cannot be bypassed.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleLegacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages
Next Article Data breach at Marquis Software Solutions affected over 780,000 people
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

In memoriam: David Harley

November 12, 2025

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

What’s at stake if your employees post too much online

December 1, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.