Cyber Security News

New Android Malware ClayRat Mimic as WhatsApp, Google Photos to Attack Users

A sophisticated Android spyware campaign dubbed ClayRat has emerged as one of the most concerning mobile threats of 2025, masquerading as popular applications including WhatsApp, Google Photos, TikTok, and YouTube to infiltrate devices and steal sensitive user data.

The malware demonstrates remarkable adaptability and persistence, with threat actors continuously evolving their tactics to bypass security measures and expand their reach across targeted regions.

ClayRat operates as a comprehensive surveillance tool capable of exfiltrating SMS messages, call logs, device notifications, and personal information while maintaining covert access to infected devices.

The spyware’s most alarming capability lies in its ability to capture photographs using the front-facing camera and weaponize the victim’s contact list by automatically sending malicious links to every saved contact, effectively transforming each compromised device into a distribution hub for further infections.

The campaign has demonstrated explosive growth over recent months, with security researchers documenting over 600 malware samples and 50 dropper variants within a three-month period.

Each iteration introduces new layers of obfuscation and packing techniques designed to evade detection systems, showcasing the operators’ commitment to maintaining persistence against evolving security defenses.

Attackers prompting victims to join Telegram channel (Source – Zimperium)

Zimperium analysts identified the malware’s sophisticated distribution network, which primarily leverages Telegram channels and carefully crafted phishing websites that closely mimic legitimate service pages.

Domain hosted online impersonating GdeDPS (Source – Zimperium)

The attackers have registered domains that impersonate well-known services, creating convincing landing pages that redirect victims to Telegram channels where malicious APK files are hosted with accompanying installation instructions designed to bypass Android’s built-in security warnings.

Advanced Infection and Persistence Mechanisms

ClayRat employs several sophisticated techniques to establish persistent access on target devices, with its most effective strategy involving the abuse of Android’s default SMS handler role.

This privileged system role grants the malware extensive access to messaging functions without triggering standard runtime permission prompts, allowing it to read, store, and forward text messages at scale while remaining largely undetected by users.

The spyware utilizes session-based installation methods specifically designed to circumvent Android 13’s enhanced security restrictions.

Dropper variants present fake Google Play Store update screens to victims, displaying familiar installation interfaces while secretly deploying encrypted payloads stored within the application’s assets.

This approach significantly reduces user suspicion and increases installation success rates by mimicking legitimate system update procedures.

Session based installation used by the malware (Source – Zimperium)

Once successfully installed and granted SMS handler privileges, ClayRat immediately begins its surveillance operations by capturing photographs using the device’s front-facing camera and uploading them to command-and-control servers.

The malware supports an extensive range of remote commands including application enumeration, call log exfiltration, notification theft, and unauthorized SMS transmission from the victim’s device.

Communication with command-and-control infrastructure occurs through standard HTTP protocols, with the malware implementing Base64 encoding combined with marker strings such as “apezdolskynet” to obfuscate traffic patterns.

Advanced variants employ AES-GCM encryption for secure communications while utilizing dynamic payload loading from encrypted assets to further complicate analysis and detection efforts.

The malware’s self-propagation mechanism represents its most dangerous feature, automatically composing and transmitting malicious links to every contact in the victim’s phonebook, creating an exponential infection pattern that exploits social trust relationships for rapid campaign expansion.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads

A new wave of cyber threats is emerging as criminals increasingly weaponize AdaptixC2, a free…

1 hour ago

Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability

Chinese-affiliated threat actor UNC6384 has been actively leveraging a critical Windows shortcut vulnerability to target…

3 hours ago

Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access

Threat actors operating under the control of North Korea's regime have demonstrated continued technical sophistication…

3 hours ago

Threat Actors Using Multilingual ZIP File to Attack Financial and Government Organizations

Sophisticated threat actors have orchestrated a coordinated multilingual phishing campaign targeting financial and government organizations…

4 hours ago

AzureHound Penetration Testing Tool Weaponized by Threat Actors to Enumerate Azure and Entra ID

AzureHound, an open-source data collection tool designed for legitimate penetration testing and security research, has…

4 hours ago

CISA Warns of XWiki Platform Injection vulnerability Exploited to Execute Remote Code

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a…

4 hours ago