Russia-linked malware operation collapses after security failures, developer’s arrest
好的,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,抓住主要信息。 文章讲的是一个叫ClayRat的安卓间谍软件,在俄罗斯短暂流行后迅速崩溃。原因是安全漏洞暴露了基础设施,而且开发者被逮捕了。ClayRat的功能包括窃取短信、通话记录、拍照等。它通过伪装成合法应用传播,主要目标是俄罗斯用户。Solar公司的报告指出,开发者的技术和运营失误导致项目失败。 接下来,我需要把这些信息浓缩到100字以内。要确保包含关键点:ClayRat的功能、传播方式、崩溃原因(安全漏洞和逮捕)、以及影响范围。 可能的结构是先介绍ClayRat及其功能,然后说明传播方式和目标,最后提到崩溃的原因和影响。这样既全面又简洁。 现在开始组织语言:“一款名为ClayRat的安卓间谍软件在俄罗斯短暂流行后迅速崩溃。该恶意软件可窃取短信、通话记录等信息,并伪装成合法应用传播。由于安全漏洞暴露基础设施及开发者被捕,项目在数月内失败。” 检查字数是否在100字以内,并确保没有遗漏关键信息。 </think> 一款名为ClayRat的安卓间谍软件在俄罗斯短暂流行后迅速崩溃。该恶意软件可窃取短信、通话记录等信息,并伪装成合法应用传播。由于安全漏洞暴露基础设施及开发者被捕,项目在数月内失败。 2026-3-23 14:30:47 Author: therecord.media(查看原文) 阅读量:9 收藏

An Android spyware operation that briefly gained traction in Russia appears to have collapsed within months of its launch after security flaws exposed its infrastructure and authorities arrested its suspected developer, cybersecurity researchers said.

The malware, known as ClayRat, was designed for espionage and remote control of infected Android devices. Once installed, it could intercept SMS messages and call logs, access contacts, take photos, record screens, and execute commands sent from a remote command-and-control server.

Despite attracting attention shortly after emerging in October 2025, ClayRat’s infrastructure deteriorated rapidly. By December, all known command servers associated with the malware had gone offline, researchers at the Russian cybersecurity firm Solar said in a report released Friday. Solar is a subsidiary of Russian state-owned telecom giant Rostelecom.

The shutdown appears to coincide with the arrest in the Russian city Krasnodar of a student suspected of developing the malware. He allegedly marketed ClayRat through Telegram channels using a subscription model that charged customers $90 per week or $300 per month, or took a 15% share of revenue generated through the malware.

At its peak, ClayRat was expanding rapidly, according to a previous report by security firm Zimperium, which identified more than 600 malware samples and around 50 droppers used to install it over the course of three months.

The malware was primarily distributed through phishing websites and applications disguised as legitimate services, including platforms mimicking WhatsApp, Google Photos, TikTok, and YouTube, as well as Russian taxi and parking apps. Researchers said the campaign largely targeted users in Russia.

According to Solar, the project’s collapse was accelerated by a series of technical and operational mistakes by its developer.

The malware contained multiple weaknesses, they said, including passwords stored in plaintext, weak code obfuscation, and a reliance on obvious command names that made its functions easier to identify. Distribution methods were also predictable, with the malware promoted openly on Telegram and delivered through phishing sites impersonating well-known applications.

“Despite its ambitious functionality, ClayRat followed the path of many short-lived Android remote access trojans,” Solar said. “After a brief spike in activity, its infrastructure deteriorated, the project appears to have been abandoned, and its creators are now being pursued by law enforcement.”

Solar noted that ClayRat’s collapse mirrors the fate of other recent malware projects. A banking trojan known as Gorilla, launched last year, also shut down within months after its operators made similar security mistakes.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/russia-malware-arrest-clayrat
如有侵权请联系:admin#unsafe.sh