Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
970x20 Itcentric
ClayRat: The spyware that targets Android users with self-propagation

ClayRat: The spyware that targets Android users with self-propagation

29 October 2025 07:15

The ClayRat spyware campaign is expanding rapidly and increasingly targeting Android users. According to Zimperium, the malware is actively spreading among Russian users through fake websites and Telegram channels, masquerading as popular apps like WhatsApp, TikTok, YouTube, and Google Photos .

Once installed, the malware gains access to a wide range of functions, including reading SMS and notifications, viewing the list of installed apps, taking photos with the front-facing camera, making calls, and sending messages.

ClayRat’s key feature is its aggressive self-propagation mechanism. The malware automatically sends malicious links to all of the victim’s contacts, turning the infected device into an active distribution hub . This allows the campaign’s creators to rapidly scale their attacks without human intervention.

Over the past 90 days, specialists have identified at least 600 unique spyware samples and approximately 50 downloaders. Each new version includes additional levels of stealth, allowing it to bypass defense mechanisms.

Distribution begins via fake websites that redirect victims to Telegram channels controlled by the attackers. These channels offer malicious APK files with supposedly high download rates and positive reviews. Of particular note is the fake ” YouTube Plus ” app with ” premium features,” which can be installed even on devices running Android 13 or later, despite the platform’s built-in limitations.

Some versions of ClayRat masquerade as legitimate apps and act solely as installers. A fake Google Play update window appears on the screen, while the encrypted malicious code is hidden within the app’s internal resources. This approach lowers the user’s guard and increases the likelihood of a successful infection. Once activated, the malware requests permission to be set as the default SMS app, gaining full access to messages and notifications.

ClayRat uses standard HTTP requests to communicate with the control infrastructure and can transmit detailed information about the device . Its functions also include capturing photos, sending a list of installed applications, and managing calls. The potential danger of this malware lies not only in its espionage capabilities, but also in its ability to transform an infected device into an automated distribution tool, significantly complicating its containment.

According to Google, active versions of ClayRat are already blocked on devices running Google Play Services thanks to Play Protect . However, attackers continue to adapt, and the threat remains relevant.

Meanwhile, researchers from the University of Luxembourg and Cheikh Anta Diop University examined pre-installed apps on low-cost Android smartphones sold in Africa. Of the 1,544 APK files analyzed, 145 exposed sensitive data, 249 provided unprotected access to critical components, and 226 executed commands with elevated privileges. This indicates a system vulnerability on these devices and further risks for users.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.