Summary is AI-generated, newsdesk-reviewed
  • Zimperium zLabs discovers enhanced ClayRat Android spyware with increased stealth and functionality.
  • New ClayRat variant exploits Accessibility Services, risking corporate data via screen captures and SMS.
  • ClayRat disguises as legitimate apps, spreading via phishing and sideloaded APKs, endangering BYOD environments.

Zimperium's security team, zLabs, has identified a significantly enhanced variant of the Android spyware known as ClayRat. Initially detailed in the October 2025 technical brief “ClayRat: A New Android Spyware Targeting Russia,” this spyware has evolved to present new challenges.

While previously capable of exfiltrating SMS messages, call logs, notifications, device data, taking photos, and sending mass SMS or making calls, the updated variant of ClayRat exhibits advanced functionality and increased stealth.

Enhanced capabilities of ClayRat

The latest version of ClayRat exploits both Default SMS privileges and Accessibility Services, allowing it to capture lock-screen credentials such as PINs, passwords, or patterns, and automatically unlock devices. Further, it can record the screen via the MediaProjection API and present deceptive overlays, such as fake system-update prompts, to evade user detection.

The spyware can also programmatically initiate taps, preventing users from powering down or uninstalling the app. By generating fake or interactive notifications and intercepting responses, ClayRat facilitates full device takeover. This poses substantial risks, as affected users may find it difficult to detect or remove the malware. Corporate devices, in particular, face heightened risks of credential leaks, hijacked SMS, notification flows, or screen capture breaches.

Distribution via phishing techniques

Building on its previous strategies, ClayRat employs widespread social engineering tactics

Building on its previous strategies, ClayRat employs widespread social engineering tactics. The spyware continues to disguise itself as legitimate applications, including popular video and messaging platforms, and localised services like Russian taxi and parking apps.

Its distribution strategy heavily relies on phishing webpages and sideloaded APKs, often via cloud storage services such as Dropbox. zLabs telemetry has identified over 700 unique ClayRat-related APKs in a brief time span.

Implications for BYOD environments

Vishnu Pratapagiri, pioneering researcher at zLabs, highlighted the need for robust security measures, stating, “ClayRat’s evolution shows exactly why enterprises need protection that works at the device level, not just network-based. By abusing Accessibility Services and overlay tricks, this variant turns Android devices into fully compromised endpoints and conventional defences may not be enough.”

As ClayRat further enhances its spyware, remote-control, and lock-screen manipulation capabilities, companies should view this as a cautionary indicator. Mobile devices, especially within Bring Your Own Device (BYOD) settings, remain vulnerable entry points for attacks. Zimperium is actively monitoring ClayRat developments and continues to share relevant compromise indicators with industry partners.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...