Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

At Starbase, SpaceX is doing its own firefighting.

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

FleetWorks raises $17 million to match truck drivers with freight faster

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New ClayRat spyware targets Android users via fake WhatsApp and TikTok apps
Identity

New ClayRat spyware targets Android users via fake WhatsApp and TikTok apps

userBy userOctober 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 9, 2025Ravi LakshmananMobile security/malware

A rapidly evolving Android spyware campaign called ClayRat targets users in Russia by impersonating popular apps such as WhatsApp, Google Photos, TikTok, and YouTube, using a combination of Telegram channels and similar phishing websites as decoys to install them.

“Once activated, the spyware can steal SMS messages, call logs, notifications, device information, take photos with the front camera, and even send SMS messages and make calls directly from the victim’s device,” Zimperium researcher Vishnu Pratapagiri said in a report shared with Hacker News.

The malware is designed to propagate itself by sending a malicious link to all contacts in a victim’s phonebook, demonstrating an aggressive tactic of attackers using infected devices as a distribution vector.

The mobile security company announced that it has detected more than 600 samples and 50 droppers in the past 90 days. Each iteration incorporated new layers of obfuscation, allowing it to evade detection efforts and stay ahead of security defenses. The malware name is a reference to a command and control (C2) panel that can be used to remotely manage infected devices.

DFIR retainer service

The attack chain involves redirecting unsuspecting visitors to these fake sites to adversary-controlled Telegram channels where they are tricked into downloading APK files by artificially inflating download numbers or sharing fabricated testimonials as proof of popularity.

In other cases, fake websites claiming to offer “YouTube Plus” with premium features have been found hosting APK files that can bypass security protections enforced by Google to prevent sideloading of apps on devices running Android 13 and above.

“To circumvent platform limitations and additional friction introduced in new Android versions, some ClayRat samples act as droppers. The displayed app is nothing more than a lightweight installer that displays a fake Play Store update screen, while the actual encrypted payload is hidden within the app’s assets,” the company said. “This session-based installation method reduces the perceived risk and increases the likelihood that spyware will be installed when you visit a web page.”

Once installed, ClayRat communicates with the C2 infrastructure using standard HTTP and prompts the user to make it the default SMS application to access sensitive content and messaging functionality. This allows it to covertly capture call logs, text messages, notifications and spread malware to all your other contacts.

Other functions of this malware include making phone calls, retrieving device information, taking photos using the device’s camera, and sending a list of all installed applications to a C2 server.

ClayRat is a powerful threat not only for its monitoring capabilities, but also for its ability to turn infected devices into distribution nodes in an automated manner. This allows threat actors to quickly expand their attack radius without manual intervention.

CIS build kit

The development comes after academics from the University of Luxembourg and Cheikh Anta Diop University discovered that pre-installed apps on low-cost Android smartphones sold in Africa were running with elevated privileges, with one package provided by the vendor sending device ID and location details to an external third party.

The study examined 1,544 APKs collected from seven smartphones in Africa and found that 145 applications (9%) exposed sensitive data, 249 (16%) applications exposed critical components without adequate safeguards, and many presented additional risks; 226 executed privileged or dangerous commands, 79 interacted with SMS messages (read, sent, or deleted), 33 “Performing a silent installation operation.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBeyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education
Next Article James Webb Telescope may have discovered controversial ‘dark star’ in distant space
user
  • Website

Related Posts

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025

How Threat Hunting Builds Readiness

October 14, 2025

A single 8-byte write shatters AMD’s SEV-SNP Confidential Computing security

October 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

At Starbase, SpaceX is doing its own firefighting.

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

FleetWorks raises $17 million to match truck drivers with freight faster

Aquawise unveils AI-powered water quality technology at TechCrunch Disrupt 2025

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Meet Your Digital Double: FySelf Unveils TwinH, the Future of Personalized Online Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.