The ClayRat spyware campaign is rapidly evolving and focuses on Russian users by leveraging Telegram channels and impersonating well-known apps to lure victims into installing the malware. This approach exploits user trust in familiar applications, increasing infection success rates.
Once active on a device, ClayRat can extract sensitive data like SMS messages, call logs, notifications, and device information. It also has the capability to capture images using the front camera, representing a significant privacy violation.
The campaign poses risks of extensive personal data theft and surveillance, which could facilitate further attacks or unauthorized access. Awareness and cautious app installation from verified sources are crucial to mitigate the threat.
👉 Pročitaj original: The Hacker News