More

    Beware Sketchy SMS Links From Your Contacts. It Could Be ‘ClayRat’ Malware

    A cybersecurity vendor has discovered a new Android malware strain that spreads by infecting a handset and then sending malicious links to every contact in the victim’s phone book.

    On Thursday, mobile security provider Zimperium warned about the “ClayRat” malware, which can spy on and steal data from infected Android phones. This includes intercepting SMS messages, exfiltrating call logs, and secretly taking photos with the camera. 

    The malware will also use the infected Android phone to target other victims. “ClayRat also spreads aggressively by sending malicious links to every contact in the victim’s phone book, effectively turning each infected device into a distribution hub,” Zimperium said. It’s why the malware appears to be “expanding at an alarming rate,” with Zimperium observing more than 600 samples of the malware in the last three months alone.

    For now, ClayRat has primarily targeted users in Russia. Hackers are using the messaging app Telegram and fake websites that impersonate brands to trick users into installing the malware, which will masquerade as popular apps, including TikTok, YouTube, and Google Photos. For example, Zimperium found the malware spreading through a fake, but official-looking “YouTube Plus” site. 

    “To increase installation success, the malware is often accompanied by simple step-by-step instructions that encourage users to bypass Android’s built-in security warnings,” Zimperium adds. “The operators further amplify their reach by seeding these Telegram channels with manufactured social proof: staged positive comments, inflated download counts, and fake ‘user testimonials’ designed to reduce suspicion.”

    The fake screen

    (Credit: Zimperium)

    By default, Android can warn and block the installation of apps downloaded from outside the Google Play Store. To beat this restriction, the malware can display “a fake Google Play update screen,” which can trick a user into authorizing the unknown app install. 

    If a user is tricked into installing ClayRat, it’ll then request SMS privileges, allowing the malware to hijack and send messages to all the phone’s contacts. This includes circulating an SMS message with the Russian words “Узнай первым!” or “Be the first to know!” along with a malicious link intended to further trick users into installing malware. 

    “Because these messages appear to come from a trusted source, recipients are far more likely to click the link, join the same Telegram channel, or visit the same phishing site,” Zimperium says. “Each infected device therefore becomes a distribution node, fueling exponential spread without the need for new infrastructure.”

    Zimperium named the malware ClayRat because its creator presents the name if you try to log into the malware’s command-and-control server. It has shared its findings with Google, a “collaboration [that] ensures that Android users are also automatically safeguarded against known versions of ClayRat through Google Play Protect,” the built-in malware prevention service on Android phones, it said.

    About Our Expert

     

    Latest articles

    Related articles