Recent updates have significantly improved the Android malware ClayRat. Now, it’s able to exfiltrate sensitive data and execute further malicious actions with greater efficiency. The newest form of the malware uses accessibility services and uses default SMS permissions to develop its functionality. With potential cyber threats becoming highly sophisticated, security experts are already warning that ClayRat could be a grave danger to users around the world.
ClayRat has been outfitted with special features that grant it the ability to log key strokes and monitor screen activity. Through overlays designed to look like real, official system update user interfaces, the malware can hide its shady work in plain sight. It includes the ability to generate counterfeit interactive alerts, thus successfully deceiving targets into supplying confidential details. One of its features is intercepting incoming SMS messages, including two-factor authentication (2FA) codes, one by one. This creates an opportunity for account takeovers.
Exploitative Features of ClayRat
The newest version of ClayRat tallies a truly deviant set of exploitative functionality, granting the malicious actor unfettered device takeover. By hijacking accessibility services, the malware can automatically unlock device PINs, passwords, and patterns. This little-used functionality can give target attackers root access to the device, compromising personal information.
ClayRat smartly collects notifications and pulls all kinds of personal device data. This includes contact info, call logs, files, etc—sensitive information that primarily belongs to users. Cybersecurity analysts stress that, unlike other malware, this particular malware doesn’t steal information, it deceives users into submitting their information freely. It accomplishes this by presenting misleading phishing screen tops.
“Android’s accessibility service is intended to aid users with disabilities, but it also can give attackers the ability to know when certain apps are launched and overwrite the screen’s display,” – Intel 471
These new capabilities combine to make ClayRat even more dangerous than ever before. Under the prior model, victims could just uninstall the app or shut down their phone as soon as they detected a compromise. Cybersecurity experts stress the need for users to stay on their toes as the malware develops.
Distribution and Targeting
Targets of ClayRat have been spread across 25 fake phishing domains that fake popular services like YouTube. This tactic increases its reach and effectiveness. It preys on unsuspecting users who believe they are interacting with trusted applications.
The samples we have online right now are customized for Polish-speaking users. Experts are cautioning against this new focus, which could be redirected to aim at different states or universities. This flexibility highlights just how much of an impact this malware can have.
“Although this particular sample was configured to target Polish-speaking users, it is plausible we will observe this theme shifting to target other regions or to impersonate other Polish institutions,” – Intel 471
The malware’s distribution techniques represent a growing trend in cybercrime. Attackers are applying social engineering tactics to increase their success rates.
Advanced Evasion Techniques
These experts from security firm SentinelOne have called ClayRat notable as it uses complex and sophisticated methods to bypass detection by security software. The danger is amplified by the malware’s innovative use of dynamic class loading and stealthy WebView content injection. Similarly, this approach greatly increases the analytical burden for conventional defenses to detect.
“The malware leverages advanced techniques to evade detection, including dynamic class loading, stealthy WebView content injection, and integer-based command-and-control instructions,” – CYFIRMA
>ClayRat is protected using a crypting service called apk0day by Golden Crypt. This only serves to complicate the efforts of cybersecurity professionals working at all levels to try and neutralize the threat that this malware poses.
While running, ClayRat transmits log events back to a server on the naleymilva.it.com domain to monitor its activity. This capability gives attackers the opportunity to hold ongoing control over infected devices and accumulate valuable information.
“During the malware runtime, the log events were sent to the remote server at the naleymilva.it.com domain to track the current status of the bot,” – Intel 471

