Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»ClayRat Spyware Campaign Targets Android Users in Russia
News

ClayRat Spyware Campaign Targets Android Users in Russia

Team-CWDBy Team-CWDOctober 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A rapidly evolving Android spyware campaign known as “ClayRat” has been discovered targeting Russian users through Telegram channels and phishing websites.

The campaign, tracked by Zimperium zLabs researchers, disguises itself as trusted apps such as WhatsApp, TikTok, Google Photos and YouTube to trick users into downloading malicious software.

A Fast-Growing Mobile Threat

Over the past three months, the researchers identified more than 600 distinct ClayRat samples and 50 droppers, each version introducing new obfuscation layers to evade security tools.

Once installed, the spyware can exfiltrate call logs, SMS messages and notifications, take photos using the front camera and even send messages or place calls directly from the victim’s phone.

“ClayRat is a new Android spyware that hides inside fake apps that mimic popular apps such as TikTok, YouTube or Google Photos, and tricks users into giving it special permissions,” said Chrissa Constantine, senior cybersecurity solution architect at Black Duck..

“Once installed, it can secretly read and send text messages, take photos, steal contact lists and call logs and spread itself.”

The spyware’s operators employ a multifaceted strategy combining impersonation, deception and automation.

Distribution occurs mainly through:

  • Phishing sites mimicking legitimate services like YouTube or Google Photos

  • Telegram channels seeded with fake reviews and inflated download counts

  • Step-by-step installation guides prompting users to bypass Android’s built-in warnings

  • Session-based installers posing as Play Store updates

Read more on Android spyware threats: Iranian Hackers Deploy New Android Spyware Version

Abuse of Android’s SMS Handler Role

ClayRat’s most concerning feature is its abuse of Android’s default SMS handler role. Once granted, this permission allows the malware to read, store and send text messages without alerting users.

The spyware exploits this access to spread itself further, sending messages such as “Be the first to know!” to every saved contact.

“Once installed, ClayRat can steal SMS messages, call logs, notifications, device identifiers, and photos taken with the front camera,” said Jason Soroko, senior fellow at Sectigo.

“It can also send SMS or place calls from the device.”

Detection and Defense

Zimperium’s systems reportedly detected ClayRat variants as soon as they appeared, before public disclosures. The company said it shared its findings with Google, helping ensure protection through Google Play Protect.

To protect against similar threats, Soroko explained: “Security teams should enforce a layered mobile security posture that reduces installation paths, detects compromise and limits blast radius.”

John Bambenek, president at Bambenek Consulting, added: “The key protection for any mobile device user is to only install applications from authorized Play/App stores, even if they get a message from an otherwise familiar contact.”

With over 600 observed samples and growing sophistication, ClayRat underscores the accelerating pace of mobile malware evolution and the need for proactive defenses.

Image credit: JarTee / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleUkraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs
Next Article All SonicWall Cloud Backup Users Have Firewall Configuration Files Sto
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Common Apple Pay scams, and how to stay safe

January 22, 2026

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

What parents should know to protect their children from doxxing

November 28, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.