New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps
A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike phishing websites by impersonating popular apps like WhatsApp, Google Photos, TikTok, and YouTube as lures to install them. "Once active, the spyware can exfiltrate SMS messages, call logs, notifications, and device information; taking photos with the front
AI Analysis
Technical Summary
ClayRat is an evolving Android spyware campaign that leverages social engineering via Telegram channels and phishing websites to impersonate widely used applications like WhatsApp, TikTok, Google Photos, and YouTube. The attackers distribute malicious APK files by artificially inflating download counts and using fake testimonials to convince victims to sideload these apps, bypassing Google Play protections especially on Android 13 and later. The malware employs a dropper mechanism where the visible app acts as a lightweight installer displaying fake update screens, while the actual encrypted spyware payload is concealed within the app assets. Once installed, ClayRat requests to become the default SMS application, granting it access to SMS messages, call logs, notifications, and the ability to send SMS or place calls covertly. It also collects device information, installed apps, and can take photos using the front camera. The spyware communicates with its command-and-control infrastructure over HTTP, facilitating remote administration. Notably, ClayRat aggressively propagates by sending malicious links to all contacts in the victim’s phonebook, automating its spread without manual attacker intervention. Over the past 90 days, security researchers have identified over 600 samples and 50 droppers, each iteration adding obfuscation layers to evade detection. Google Play Protect offers protection against known variants, but the malware’s rapid evolution and sophisticated evasion techniques present ongoing risks. The campaign’s initial focus has been Russia, but the tactics and malware capabilities pose a broader threat to Android users globally, including Europe. The malware’s ability to covertly surveil users and turn devices into distribution nodes makes it a potent espionage and propagation tool.
Potential Impact
For European organizations, ClayRat presents significant risks due to the widespread use of Android devices among employees and consumers. The spyware’s capability to exfiltrate SMS, call logs, notifications, and device information threatens confidentiality and privacy, potentially exposing sensitive corporate communications and personal data. Its ability to take photos covertly and send SMS or place calls can facilitate espionage, social engineering, and unauthorized financial transactions. The automated propagation mechanism increases the risk of rapid internal spread within organizations, potentially compromising multiple devices and expanding the attack surface. Given the malware’s evasion techniques, traditional antivirus solutions may struggle to detect newer variants, increasing the likelihood of prolonged undetected infections. This threat could disrupt business operations if devices are misused for fraudulent calls or SMS, and damage organizational reputation if customer or employee data is leaked. The spyware’s presence also complicates incident response and forensic investigations due to its stealth and obfuscation. European regulatory frameworks like GDPR heighten the consequences of data breaches caused by such spyware, potentially leading to significant fines and legal repercussions. Overall, ClayRat’s surveillance and propagation capabilities pose a medium to high risk to European enterprises, especially those with mobile-first workforces or sensitive communications.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy against ClayRat. First, enforce strict mobile device management (MDM) policies that restrict installation of apps from unknown sources and disable sideloading where possible, especially on corporate devices. Educate users about the risks of downloading apps from unofficial sources and phishing campaigns impersonating popular apps, emphasizing verification of app legitimacy via official app stores. Deploy advanced endpoint detection and response (EDR) solutions capable of behavioral analysis to detect suspicious activities such as unauthorized SMS app changes, unusual network communications, or mass messaging to contacts. Monitor network traffic for HTTP communications to suspicious command-and-control servers and implement domain and URL filtering to block known malicious Telegram channels and phishing websites. Regularly update Android devices and security software to benefit from the latest protections, including Google Play Protect updates. Conduct periodic audits of installed applications and permissions on corporate devices to identify unauthorized apps or privilege escalations. Establish incident response plans tailored to mobile threats, including rapid isolation and forensic analysis of infected devices. Collaborate with threat intelligence providers to stay informed about new ClayRat variants and indicators of compromise. Finally, consider deploying mobile threat defense (MTD) solutions that integrate with MDM to provide real-time protection and automated remediation against spyware threats.
Affected Countries
Russia, Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps
Description
A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike phishing websites by impersonating popular apps like WhatsApp, Google Photos, TikTok, and YouTube as lures to install them. "Once active, the spyware can exfiltrate SMS messages, call logs, notifications, and device information; taking photos with the front
AI-Powered Analysis
Technical Analysis
ClayRat is an evolving Android spyware campaign that leverages social engineering via Telegram channels and phishing websites to impersonate widely used applications like WhatsApp, TikTok, Google Photos, and YouTube. The attackers distribute malicious APK files by artificially inflating download counts and using fake testimonials to convince victims to sideload these apps, bypassing Google Play protections especially on Android 13 and later. The malware employs a dropper mechanism where the visible app acts as a lightweight installer displaying fake update screens, while the actual encrypted spyware payload is concealed within the app assets. Once installed, ClayRat requests to become the default SMS application, granting it access to SMS messages, call logs, notifications, and the ability to send SMS or place calls covertly. It also collects device information, installed apps, and can take photos using the front camera. The spyware communicates with its command-and-control infrastructure over HTTP, facilitating remote administration. Notably, ClayRat aggressively propagates by sending malicious links to all contacts in the victim’s phonebook, automating its spread without manual attacker intervention. Over the past 90 days, security researchers have identified over 600 samples and 50 droppers, each iteration adding obfuscation layers to evade detection. Google Play Protect offers protection against known variants, but the malware’s rapid evolution and sophisticated evasion techniques present ongoing risks. The campaign’s initial focus has been Russia, but the tactics and malware capabilities pose a broader threat to Android users globally, including Europe. The malware’s ability to covertly surveil users and turn devices into distribution nodes makes it a potent espionage and propagation tool.
Potential Impact
For European organizations, ClayRat presents significant risks due to the widespread use of Android devices among employees and consumers. The spyware’s capability to exfiltrate SMS, call logs, notifications, and device information threatens confidentiality and privacy, potentially exposing sensitive corporate communications and personal data. Its ability to take photos covertly and send SMS or place calls can facilitate espionage, social engineering, and unauthorized financial transactions. The automated propagation mechanism increases the risk of rapid internal spread within organizations, potentially compromising multiple devices and expanding the attack surface. Given the malware’s evasion techniques, traditional antivirus solutions may struggle to detect newer variants, increasing the likelihood of prolonged undetected infections. This threat could disrupt business operations if devices are misused for fraudulent calls or SMS, and damage organizational reputation if customer or employee data is leaked. The spyware’s presence also complicates incident response and forensic investigations due to its stealth and obfuscation. European regulatory frameworks like GDPR heighten the consequences of data breaches caused by such spyware, potentially leading to significant fines and legal repercussions. Overall, ClayRat’s surveillance and propagation capabilities pose a medium to high risk to European enterprises, especially those with mobile-first workforces or sensitive communications.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy against ClayRat. First, enforce strict mobile device management (MDM) policies that restrict installation of apps from unknown sources and disable sideloading where possible, especially on corporate devices. Educate users about the risks of downloading apps from unofficial sources and phishing campaigns impersonating popular apps, emphasizing verification of app legitimacy via official app stores. Deploy advanced endpoint detection and response (EDR) solutions capable of behavioral analysis to detect suspicious activities such as unauthorized SMS app changes, unusual network communications, or mass messaging to contacts. Monitor network traffic for HTTP communications to suspicious command-and-control servers and implement domain and URL filtering to block known malicious Telegram channels and phishing websites. Regularly update Android devices and security software to benefit from the latest protections, including Google Play Protect updates. Conduct periodic audits of installed applications and permissions on corporate devices to identify unauthorized apps or privilege escalations. Establish incident response plans tailored to mobile threats, including rapid isolation and forensic analysis of infected devices. Collaborate with threat intelligence providers to stay informed about new ClayRat variants and indicators of compromise. Finally, consider deploying mobile threat defense (MTD) solutions that integrate with MDM to provide real-time protection and automated remediation against spyware threats.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/10/new-clayrat-spyware-targets-android.html","fetched":true,"fetchedAt":"2025-10-11T01:08:52.628Z","wordCount":1207}
Threat ID: 68e9ae2654cfe91d8fe9e2ed
Added to database: 10/11/2025, 1:08:54 AM
Last enriched: 10/11/2025, 1:10:53 AM
Last updated: 10/11/2025, 12:22:09 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign
MediumFake TikTok and WhatsApp Apps Infect Android Devices with ClayRat Spyware
MediumChinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave
MediumHackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks
MediumLook mom HR application, look mom no job - phishing using Zoom docs to harvest Gmail creds
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.