Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ClayRat Android Malware Steals SMS Messages, Call Logs and Capture Victim Photos

Posted on December 5, 2025December 5, 2025 By CWS

A harmful new Android spyware and adware variant known as ClayRat has emerged as a major risk to cellular system safety worldwide.

First recognized in October by the zLabs staff, this malware represents a regarding evolution in cellular threats with capabilities that enable attackers to realize near-complete management over contaminated units.

The spyware and adware demonstrates refined strategies to steal delicate private information whereas remaining hidden from victims who may in any other case detect and take away it.

ClayRat operates by mimicking reputable purposes, together with in style platforms like YouTube and messaging apps, in addition to localized companies equivalent to Russian taxi and parking purposes.

The malware primarily spreads by means of phishing web sites, with over 25 fraudulent domains presently lively, internet hosting malicious recordsdata.

Moreover, cloud storage companies like Dropbox have been noticed distributing the malware, increasing its attain considerably.

Researchers have already detected greater than 700 distinctive APK recordsdata in an impressively brief timeframe, indicating a large-scale distribution marketing campaign.

Malware impersonating youtube and native connection stabilizer (Supply -Zimperium)

The malware enters units by means of misleading set up prompts that request permissions for SMS and accessibility options.

Zimperium safety analysts recognized that ClayRat employs a complicated dropper method to bypass Android safety restrictions.

The encrypted payload stays saved within the utility’s property folder, utilizing AES/CBC decryption with embedded keys to unpack itself throughout runtime, making detection significantly more difficult for normal safety measures.

Opening property folder and utilizing AES – CBC for decryption (Supply – Zimperium)

As soon as put in, ClayRat escalates its privileges by requesting customers allow Accessibility Providers alongside default SMS permissions.

This mix of permissions creates a harmful window for attackers to use the system comprehensively.

Persistence Ways By Accessibility Service Abuse

The brand new variant considerably expands its capabilities by means of aggressive misuse of Accessibility Providers.

After acquiring obligatory permissions, the malware mechanically disables the Play Retailer by means of automated display clicks, eradicating Google Play Defend safety protections with out person data.

The spyware and adware screens all lock display interactions, together with button presses and sample actions, reconstructing PIN codes, passwords, and patterns with exceptional accuracy.

Request for default SMS and accessibility permission (Supply – Zimperium)

When victims enter their credentials, the malware captures this info in SharedPreferences underneath the important thing lock_password_storage.

Utilizing the saved credentials, the malware then executes an auto_unlock command that sends gestures to unlock the system mechanically, utterly eradicating the sufferer’s capacity to detect the an infection by means of the lock display.

This system ensures ClayRat maintains persistent entry no matter tried system safety measures.

Moreover, the malware captures pictures utilizing the system digital camera, information display content material by means of MediaProjection APIs, steals SMS messages and name logs, and creates pretend notifications to intercept delicate replies from customers.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Android, Call, Capture, ClayRat, Logs, Malware, Messages, Photos, SMS, Steals, Victim

Post navigation

Previous Post: CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
Next Post: Cloudflare Outage Hits Internet with 500 Internal Server Error

Related Posts

New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell Cyber Security News
New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment Cyber Security News
New LOSTKEYS Malware Linked to Russia State-Sponsored Hacker Group COLDRIVER Cyber Security News
Anthropic’s MCP Server Vulnerability Let Attackers Escape Server’s Sandbox and Execute Arbitrary Code Cyber Security News
Microsoft Urges OEM Manufacturers to Fix Windows 11 USB-C Notification Issues Cyber Security News
Threat Actors Weaponizes Judicial Documents to Deliver PureHVNC RAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark