Zimperium's security team, zLabs, has identified a significantly enhanced variant of the Android spyware known as ClayRat. Initially detailed in the October 2025 technical brief “ClayRat: A New Android Spyware Targeting Russia,” this spyware has evolved to present new challenges.
While previously capable of exfiltrating SMS messages, call logs, notifications, device data, taking photos, and sending mass SMS or making calls, the updated variant of ClayRat exhibits advanced functionality and increased stealth.
Enhanced capabilities of ClayRat
The latest version of ClayRat exploits both Default SMS privileges and Accessibility Services, allowing it to capture lock-screen credentials such as PINs, passwords, or patterns, and automatically unlock devices. Further, it can record the screen via the MediaProjection API and present deceptive overlays, such as fake system-update prompts, to evade user detection.
The spyware can also programmatically initiate taps, preventing users from powering down or uninstalling the app. By generating fake or interactive notifications and intercepting responses, ClayRat facilitates full device takeover. This poses substantial risks, as affected users may find it difficult to detect or remove the malware. Corporate devices, in particular, face heightened risks of credential leaks, hijacked SMS, notification flows, or screen capture breaches.
Distribution via phishing techniques
Building on its previous strategies, ClayRat employs widespread social engineering tactics
Building on its previous strategies, ClayRat employs widespread social engineering tactics. The spyware continues to disguise itself as legitimate applications, including popular video and messaging platforms, and localised services like Russian taxi and parking apps.
Its distribution strategy heavily relies on phishing webpages and sideloaded APKs, often via cloud storage services such as Dropbox. zLabs telemetry has identified over 700 unique ClayRat-related APKs in a brief time span.
Implications for BYOD environments
Vishnu Pratapagiri, pioneering researcher at zLabs, highlighted the need for robust security measures, stating, “ClayRat’s evolution shows exactly why enterprises need protection that works at the device level, not just network-based. By abusing Accessibility Services and overlay tricks, this variant turns Android devices into fully compromised endpoints and conventional defences may not be enough.”
As ClayRat further enhances its spyware, remote-control, and lock-screen manipulation capabilities, companies should view this as a cautionary indicator. Mobile devices, especially within Bring Your Own Device (BYOD) settings, remain vulnerable entry points for attacks. Zimperium is actively monitoring ClayRat developments and continues to share relevant compromise indicators with industry partners.
Learn why leading casinos are upgrading to smarter, faster, and more compliant systems