ClayRat, a rapidly evolving Android spyware campaign, is targeting users in Russia using Telegram channels and phishing websites. The spyware mimics popular apps like WhatsApp and YouTube to trick users into installation.
Spyware Functionality
Once activated, ClayRat spyware can exfiltrate sensitive data such as SMS messages, call logs, and device information. It can also take photos using the device's front camera, send SMS messages, and make calls. According to Zimperium researcher Vishnu Pratapagiri, the malware spreads by sending malicious links to every contact in the victim's phone book.
- Targets: Russian Android users.
- Platforms: Phishing sites mimic popular apps.
- Distribution: Telegram channels and malicious links.
- Data Stolen: SMS, calls, notifications, and device info.
Technical Mechanics
Zimperium has identified at least 600 samples and 50 droppers over the last 90 days. The spyware's evolving iterations are using obfuscation methods to evade detection. ClayRat utilizes a command-and-control (C2) panel for administration, redirecting users to fraudulent sites that inflate download counts with fabricated testimonials.
Some samples act as droppers, creating a faux Play Store update while concealing the real payload in the app's assets. The malware exploits standard HTTP communication with its C2 and requests permissions to be the default SMS app to secretly capture and disseminate messages.
Implications and Broader Risks
The campaign underscores broader mobile security concerns, as demonstrated by a separate study on budget Android phones sold in Africa. Conducted by the University of Luxembourg and Université Cheikh Anta Diop, the study revealed that preinstalled apps often possess elevated privileges, leading to risks like data disclosure and unauthorized actions.
This highlights the need for increased vigilance and better security measures for Android devices worldwide.




 
    
     
    
     
    
     
    
     
    
     
    
     
    
     
    
     
    
    