Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps

0
Medium
Phishingandroidweb
Published: Thu Oct 09 2025 (10/09/2025, 15:30:00 UTC)
Source: The Hacker News

Description

A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike phishing websites by impersonating popular apps like WhatsApp, Google Photos, TikTok, and YouTube as lures to install them. "Once active, the spyware can exfiltrate SMS messages, call logs, notifications, and device information; taking photos with the front

AI-Powered Analysis

AILast updated: 10/11/2025, 01:10:53 UTC

Technical Analysis

ClayRat is an evolving Android spyware campaign that leverages social engineering via Telegram channels and phishing websites to impersonate widely used applications like WhatsApp, TikTok, Google Photos, and YouTube. The attackers distribute malicious APK files by artificially inflating download counts and using fake testimonials to convince victims to sideload these apps, bypassing Google Play protections especially on Android 13 and later. The malware employs a dropper mechanism where the visible app acts as a lightweight installer displaying fake update screens, while the actual encrypted spyware payload is concealed within the app assets. Once installed, ClayRat requests to become the default SMS application, granting it access to SMS messages, call logs, notifications, and the ability to send SMS or place calls covertly. It also collects device information, installed apps, and can take photos using the front camera. The spyware communicates with its command-and-control infrastructure over HTTP, facilitating remote administration. Notably, ClayRat aggressively propagates by sending malicious links to all contacts in the victim’s phonebook, automating its spread without manual attacker intervention. Over the past 90 days, security researchers have identified over 600 samples and 50 droppers, each iteration adding obfuscation layers to evade detection. Google Play Protect offers protection against known variants, but the malware’s rapid evolution and sophisticated evasion techniques present ongoing risks. The campaign’s initial focus has been Russia, but the tactics and malware capabilities pose a broader threat to Android users globally, including Europe. The malware’s ability to covertly surveil users and turn devices into distribution nodes makes it a potent espionage and propagation tool.

Potential Impact

For European organizations, ClayRat presents significant risks due to the widespread use of Android devices among employees and consumers. The spyware’s capability to exfiltrate SMS, call logs, notifications, and device information threatens confidentiality and privacy, potentially exposing sensitive corporate communications and personal data. Its ability to take photos covertly and send SMS or place calls can facilitate espionage, social engineering, and unauthorized financial transactions. The automated propagation mechanism increases the risk of rapid internal spread within organizations, potentially compromising multiple devices and expanding the attack surface. Given the malware’s evasion techniques, traditional antivirus solutions may struggle to detect newer variants, increasing the likelihood of prolonged undetected infections. This threat could disrupt business operations if devices are misused for fraudulent calls or SMS, and damage organizational reputation if customer or employee data is leaked. The spyware’s presence also complicates incident response and forensic investigations due to its stealth and obfuscation. European regulatory frameworks like GDPR heighten the consequences of data breaches caused by such spyware, potentially leading to significant fines and legal repercussions. Overall, ClayRat’s surveillance and propagation capabilities pose a medium to high risk to European enterprises, especially those with mobile-first workforces or sensitive communications.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy against ClayRat. First, enforce strict mobile device management (MDM) policies that restrict installation of apps from unknown sources and disable sideloading where possible, especially on corporate devices. Educate users about the risks of downloading apps from unofficial sources and phishing campaigns impersonating popular apps, emphasizing verification of app legitimacy via official app stores. Deploy advanced endpoint detection and response (EDR) solutions capable of behavioral analysis to detect suspicious activities such as unauthorized SMS app changes, unusual network communications, or mass messaging to contacts. Monitor network traffic for HTTP communications to suspicious command-and-control servers and implement domain and URL filtering to block known malicious Telegram channels and phishing websites. Regularly update Android devices and security software to benefit from the latest protections, including Google Play Protect updates. Conduct periodic audits of installed applications and permissions on corporate devices to identify unauthorized apps or privilege escalations. Establish incident response plans tailored to mobile threats, including rapid isolation and forensic analysis of infected devices. Collaborate with threat intelligence providers to stay informed about new ClayRat variants and indicators of compromise. Finally, consider deploying mobile threat defense (MTD) solutions that integrate with MDM to provide real-time protection and automated remediation against spyware threats.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/10/new-clayrat-spyware-targets-android.html","fetched":true,"fetchedAt":"2025-10-11T01:08:52.628Z","wordCount":1207}

Threat ID: 68e9ae2654cfe91d8fe9e2ed

Added to database: 10/11/2025, 1:08:54 AM

Last enriched: 10/11/2025, 1:10:53 AM

Last updated: 10/11/2025, 12:22:09 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats