A brand new Android spyware and adware known as ClayRat is luring potential victims by posing as fashionable apps and providers like WhatsApp, Google Pictures, TikTok, and YouTube.
The malware is concentrating on Russian customers by means of Telegram channels and malicious web sites that seem professional. It might probably steal SMS meessages name logs, notifications, take photos, and even make cellphone calls.
Malware researchers at cell safety firm Zimperium say that they documented greater than 600 samples and 50 distinct droppers over the previous three months, indicating an lively effort from the attacker to amplify the operation.
ClayRat marketing campaign
The ClayRat marketing campaign, named after the malware’s command and management (C2) server, makes use of rigorously crafted phishing portals and registered domains that intently mimic professional service pages.
These websites host or redirect guests to Telegram channels the place the Android bundle information (APKs) are offered to unsuspecting victims.
So as to add legitimacy to those websites, the risk actors have added pretend feedback, inflated obtain counts, and used a bogus Play Retailer-like UX with step-by-step directions on find out how to sideload APKs and bypass Android’s safety warnings.

Supply: Zimperium
In response to Zimperium, some ClayRat malware samples act as droppers, the place the app the person sees is a pretend Play Retailer replace display and an encrypted payload is hidden within the app’s property.
The malware nests within the system utilizing a “session-based” set up technique to bypass Android 13+ restrictions and scale back person suspicion.
“This session-based set up technique lowers perceived danger and will increase the probability {that a} webpage go to will end in spyware and adware being put in,” the researchers say.
As soon as lively on the system, the malware can use the brand new host to propagate to extra victims by utilizing it as a springboard to ship SMS to the sufferer’s contact record.

Supply: Zimperium
Spyware and adware’s capabilities
The ClayRat spyware and adware assumes the default SMS handler function on contaminated units, permitting it to learn all incoming and saved SMS, intercept them earlier than different apps, and modify SMS databases.

Supply: Zimperium
The spyware and adware establishes communication with the C2, which are AES-GCM encrypted in its newest variations, after which receives one of many 12 supported instructions:
- get_apps_list — ship record of put in apps to C2
- get_calls — ship name logs
- get_camera — take a front-camera photograph and ship it to the server
- get_sms_list — exfiltrate SMS messages
- messsms — ship mass SMS to all contacts
- send_sms / make_call — ship SMS or place calls from the system
- notifications / get_push_notifications — seize notifications and push information
- get_device_info — acquire system info
- get_proxy_data — fetch a proxy WebSocket URL, append system ID, and initialize a connection object (converts HTTP/HTTPS to WebSocket and schedules duties)
- retransmishion — resend an SMS to a quantity obtained from C2
When the required permissions are granted, the spyware and adware robotically harvests contacts and programmatically composes and sends SMS messages to each contact for en-masse propagation.
As a member of the App Protection Alliance, Zimperium shared the full IoCs with Google, and Play Defend now blocks identified and new variants of the ClayRat spyware and adware.
Nevertheless, the researchers uunderline that the marketing campaign is huge, with greater than 600 samples on document in three months.