ClayRat Spyware Tricks Android Users with Fake Apps

Deceptive Campaign Targets Android Users

A fast-evolving Android spyware called ClayRat is targeting users through fake versions of popular apps. The campaign mainly spreads through messaging channels and phishing websites, luring users with counterfeit WhatsApp, TikTok, YouTube, and Google Photos apps.

Once installed, ClayRat secretly collects private data such as SMS messages, call logs, and device information. It can also take photos with the front camera, send texts, and make calls, all without the user’s consent.

Aggressive Self-Spreading Tactics

However, ClayRat doesn’t stop there. The spyware spreads itself by sending malicious links to every contact in the victim’s phone book. This makes each infected phone a new source for spreading the malware further.

Researchers found over 600 infected samples and 50 droppers within 90 days. Each new version uses stronger obfuscation methods to evade detection. The malware’s name refers to its command-and-control panel, which allows attackers to manage infected devices remotely.

Fake App Stores and Telegram Channels

The attackers use fake websites and Telegram channels to trick people into downloading the spyware. They boost download numbers and share fake reviews to seem trustworthy. Some sites even offer counterfeit “YouTube Plus” apps, which bypass Android’s security features to allow easy installation on newer devices.

To appear legitimate, some ClayRat versions act as installers with fake update screens. The real malicious code hides inside the app’s files. This method lowers suspicion and increases the chance users unknowingly install the spyware.

Data Theft and Device Control

After installation, ClayRat communicates with its control servers through standard web protocols. It then requests permission to become the default SMS app, allowing it to capture messages, notifications, and call logs. Therefore, the spyware can steal data and spread automatically to other users.

ClayRat’s functions also include making calls, gathering device info, taking photos, and listing installed apps. This makes it both a surveillance and distribution tool, expanding rapidly with little attacker effort.

Wider Privacy Concerns

In related findings, researchers discovered that many pre-installed apps on low-cost Android phones leak sensitive data. About 9% of these apps share private information, while others expose critical system components or perform hidden installations. This highlights growing concerns over Android device security and data privacy.

How to Stay Protected

To prevent such attacks, users should avoid downloading apps from unofficial websites or links shared via messages. Installing mobile protection software that scans for spyware, monitors app permissions, and detects phishing pages can greatly reduce risk. Advanced solutions also offer real-time threat detection and secure browsing features to block fake app downloads before they start.

Sleep well, we got you covered.

Scroll to Top