Upgraded ClayRat Spyware Now Hijacks Android Devices

Upgraded ClayRat Spyware Now Hijacks Android Devices

With the recent Zimperium advisory on the ClayRat Android spyware, we’re seeing a significant escalation in mobile threats. To understand the gravity of this evolution, we sat down with Rupert Marais, our in-house security specialist, whose work focuses on the very endpoint and device security now under siege. We’ll explore the technical prowess behind this malware, how it traps users and maintains its grip on their devices, the sheer scale of the operation, and the chilling implications for corporate data in an age of bring-your-own-device work environments.

The report notes ClayRat’s evolution from basic SMS theft to abusing Accessibility Services. Can you explain the technical significance of combining these permissions, and walk us through how this allows attackers to achieve near-total device control?

It’s a truly potent combination, a perfect storm of permissions. On its own, getting control of SMS is already dangerous; attackers can intercept one-time passcodes for banking or corporate logins. But when you layer on Accessibility Services, you hand them the keys to the kingdom. Accessibility Services are designed with immense power to help users navigate their device, meaning the service can see everything on the screen and perform taps or swipes on the user’s behalf. By tricking a user into granting both, ClayRat can not only read a sensitive 2FA code arriving via SMS but also input it into an app, approve a login, and then delete the original message, all without the user ever knowing. It’s the difference between an attacker peeking through your window versus having them inside your house with your keys and alarm code.

ClayRat uses automated taps to block uninstallation and deceptive overlays to hide its activity. Could you elaborate on how these features work together to maintain persistence on a device, perhaps sharing a step-by-step example of how a typical user gets trapped?

These features create a digital prison for the user. Imagine you download an app that impersonates a taxi service. It prompts you to enable Accessibility Services for a seemingly legitimate reason. Once you do, the trap is sprung. Later, you might notice odd behavior and try to uninstall the app. As soon as you navigate to your phone’s settings and tap on the malicious app to remove it, ClayRat detects this action. It immediately triggers an automated tap that either presses the “Back” button or closes the settings window entirely. To the user, it just looks like a frustrating glitch. While you’re trying to figure out what’s wrong, it might display a fake “System Update” overlay, making you think the phone is busy while it exfiltrates your photos and call logs in the background. You’re effectively locked out of the very controls meant to protect you.

The spyware reportedly disables Google Play Protect before monitoring the lock screen to steal credentials. Can you break down the process of how it actually captures a user’s PIN or pattern and then uses automated gestures to unlock the device later?

This is a clever and deeply invasive process. First, disabling Google Play Protect is like a burglar cutting the power to the security system; it removes a critical layer of defense that could otherwise flag or remove the malware. Once that’s done, the spyware patiently waits for you to unlock your phone. Using the screen-reading power of Accessibility Services, it doesn’t need a traditional keylogger. Instead, it logs the precise coordinates of your taps for a PIN or the vector path of your swipe for a pattern. It’s essentially recording your muscle memory. Once it has successfully captured and reconstructed that sequence, it stores it. Later, it can use automated gestures to perfectly replay your PIN or pattern, unlocking your device whenever it wants, perhaps in the dead of night, to open corporate apps or intercept sensitive alerts.

With over 700 unique APKs and 25 phishing domains impersonating services like YouTube, what does this scale suggest about the attackers? Please elaborate on the resources and strategy required to manage such a widespread and varied campaign.

This isn’t the work of a hobbyist in a basement. A campaign of this magnitude points to a well-organized and well-funded group. Creating over 700 unique APKs, or application files, is a deliberate strategy to evade detection; each minor variation makes it harder for antivirus software that relies on known file signatures to catch it. Managing 25 or more phishing domains requires significant infrastructure and a deep understanding of social engineering. They aren’t just using one lure; they’re impersonating a range of services, from global platforms like YouTube to regional taxi apps, to cast the widest possible net. This level of operational complexity—developing the malware, creating convincing phishing sites, managing the distribution, and processing the stolen data—indicates a professional, financially motivated criminal enterprise.

The advisory highlights the threat to corporate systems in BYOD environments. Can you provide a specific, step-by-step scenario where an employee’s infected phone is used to compromise corporate data by intercepting authentication prompts or sensitive notifications?

Absolutely, and it’s a scenario that keeps security professionals up at night. Let’s say an employee has their personal phone, which they also use for work, infected with ClayRat. The employee sits down at their laptop to log into the company’s secure cloud server. After they enter their password, the system, as a security measure, sends a push notification to their phone asking them to approve the login. Before the employee can even reach for their phone, ClayRat’s Accessibility Service function sees the notification pop up. It then performs an automated tap on the “Approve” button. To the corporate server, the login looks completely legitimate. The attacker, who already has the employee’s password, is now inside the network, and the employee is completely unaware their phone just served as the gateway for a major corporate breach.

What is your forecast for the evolution of mobile spyware like ClayRat?

I believe we’re going to see this trend of abusing legitimate system functions, particularly Accessibility Services, accelerate. Attackers have realized it’s far more effective than trying to find a rare software vulnerability. I forecast that future spyware will become even more autonomous, using on-device machine learning to better understand user behavior and hide its tracks more effectively. We’ll likely see more targeted attacks where the malware is programmed to specifically look for and interact with popular enterprise applications for things like finance or HR. The mobile device is the new frontline in cybersecurity, and the fight will be about defending the integrity of the operating system itself against these increasingly sophisticated mimics.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later