Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps

Posted on October 9, 2025October 9, 2025 By CWS

Oct 09, 2025Ravie LakshmananMobile Safety / Malware
A quickly evolving Android spyware and adware marketing campaign known as ClayRat has focused customers in Russia utilizing a mixture of Telegram channels and lookalike phishing web sites by impersonating fashionable apps like WhatsApp, Google Images, TikTok, and YouTube as lures to put in them.
“As soon as lively, the spyware and adware can exfiltrate SMS messages, name logs, notifications, and gadget info; taking images with the entrance digicam; and even ship SMS messages or place calls immediately from the sufferer’s gadget,” Zimperium researcher Vishnu Pratapagiri mentioned in a report shared with The Hacker Information.
The malware can also be designed to propagate itself by sending malicious hyperlinks to each contact within the sufferer’s telephone guide, indicating aggressive ways on the a part of the attackers to leverage compromised units as a distribution vector.
The cell safety firm mentioned it has detected a minimum of 600 samples and 50 droppers over the past 90 days, with every successive iteration incorporating new layers of obfuscation to sidestep detection efforts and keep forward of safety defenses. The malware title is a reference to the command-and-control (C2) panel that can be utilized to remotely administer the contaminated units.

The assault chain entails redirecting unsuspecting guests to those bogus websites to Telegram channels underneath the adversary’s management, from the place they’re tricked into downloading APK recordsdata by artificially inflating obtain counts and sharing manufactured testimonials as proof of their reputation.
In different circumstances, bogus web sites claiming to supply “YouTube Plus” with premium options have been discovered to host APK recordsdata that may bypass safety protections enforced by Google to stop sideloading of apps on units working Android 13 and later.
“To bypass platform restrictions and the added friction launched in newer Android variations, some ClayRat samples act as droppers: the seen app is merely a light-weight installer that shows a pretend Play Retailer replace display screen, whereas the precise encrypted payload is hidden inside the app’s belongings,” the corporate mentioned. “This session-based set up technique lowers perceived danger and will increase the chance {that a} webpage go to will lead to spyware and adware being put in.”
As soon as put in, ClayRat makes use of customary HTTP to speak with its C2 infrastructure and requests customers to make it the default SMS utility to achieve entry to delicate content material and messaging features, thereby permitting it to covertly seize name logs, textual content messages, notifications, and disseminate the malware additional to each different contact.
A few of the different options of the malware embrace making telephone calls, getting gadget info, taking photos utilizing the gadget digicam, and sending an inventory of all put in functions to the C2 server.
ClayRat is a potent risk not just for its surveillance capabilities, but in addition for its skill to show an contaminated gadget right into a distribution node in an automatic trend, which permits the risk actors to broaden their attain swiftly with none guide intervention.

The event comes as lecturers from the College of Luxembourg and Université Cheikh Anta Diop discovered that pre-installed apps from finances Android smartphones offered in Africa function with elevated privileges, with one vendor-supplied bundle transmitting gadget identifiers and placement particulars to an exterior third-party.
The examine examined 1,544 APKs collected from seven African smartphones, discovering that “145 functions (9%) disclose delicate knowledge, 249 (16%) expose important elements with out ample safeguards, and lots of current further dangers: 226 execute privileged or harmful instructions, 79 work together with SMS messages (learn, ship, or delete), and 33 carry out silent set up operations.”

The Hacker News Tags:Android, Apps, ClayRat, Fake, Spyware, Targets, TikTok, Users, WhatsApp

Post navigation

Previous Post: SquareX Reveals AI Browsers Vulnerable to OAuth Attacks and Malware Threats
Next Post: Chaos Emerges as Faster, Smarter, and More Dangerous Ransomware

Related Posts

The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations  The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations  The Hacker News
Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits The Hacker News
Android Enhances Security with New Intrusion Logging Android Enhances Security with New Intrusion Logging The Hacker News
Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation The Hacker News
Microsoft Unveils DNS ClickFix Attack Using Nslookup Microsoft Unveils DNS ClickFix Attack Using Nslookup The Hacker News
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark