Zimperium - Experts & Thought Leaders
Latest Zimperium news & announcements
Zimperium, the pioneer in mobile security, today announced new research from its zLabs team uncovering DroidLock, a rapidly evolving Android malware campaign targeting users in Spain. Unlike traditional mobile malware, DroidLock behaves more like full-scale ransomware, enabling complete device takeover through screen-locking overlays, credential theft, and remote control capabilities. Android safeguards zLabs researchers found that DroidLock is distributed through phishing websites and begins with a deceptive dropper app designed to bypass Android safeguards and exploit Accessibility Services. Once installed, the malware automatically approves additional permissions, granting access to SMS, call logs, contacts, audio, and more, without the victim’s awareness. HTTP and WebSocket channels After establishing persistence, DroidLock communicates with its command-and-control server using both HTTP and WebSocket channels. Through these channels, attackers can issue any of 15 distinct commands, enabling them to: Lock the device or change the PIN/password Wipe the device through a factory reset Silently capture the victim’s image using the front camera Mute notifications and restrict user interaction Stream the device’s screen and remotely control it via VNC Display ransomware-style full-screen overlays demanding payment within 24 hours Dual overlay mechanisms A notable tactic includes dual overlay mechanisms used to steal lock-patterns and app credentials. DroidLock deploys fast in-memory overlays to capture screen unlock patterns, while WebView-based overlays render attacker-controlled HTML to harvest credentials from targeted apps. The malware also displays a convincing fake Android system-update screen to keep victims from powering off or interrupting the attack. Although the ransomware overlay does not encrypt files, DroidLock can wipe the device entirely, permanently locking users out and enabling indefinite control by the attacker. Intercept one-time passcodes “For enterprises, a compromised device becomes a hostile endpoint,” said Vishnu Pratapagiri, Security Researcher at Zimperium and author of the analysis. “DroidLock can intercept one-time passcodes, change device credentials, wipe data, and remotely control the user interface. Organizations need mobile security that stops these attacks before they disrupt operations or enable account takeover.”
Building on earlier research published in October 2025, Zimperium announced that its zLabs team has uncovered a significantly enhanced variant of ClayRat, an Android spyware family first detailed in the technical brief “ClayRat: A New Android Spyware Targeting Russia”. While the original ClayRat strain was able to exfiltrate SMS messages, call logs, notifications, device data, take photos, and send mass SMS or place calls, effectively allowing infected devices to become distribution hubs. The newly observed variant demonstrates a substantial escalation in functionality and stealth. The updated strain abuses both Default SMS privileges and Accessibility Services, enabling it to: Capture lock-screen credentials (PIN, password, or pattern) and automatically unlock the device. Record the screen via the MediaProjection API. Present deceptive overlays (for example, fake system-update prompts) to prevent user detection. Programmatically initiate taps — blocking the user from powering down or uninstalling the malicious app. Generate fake or interactive notifications, then intercept and exfiltrate responses. This expanded functionality enables full device takeover, making ClayRat far more dangerous than the version first reported, especially since victims may no longer detect or easily remove the malware. The updated behavior also increases the risk to corporate endpoints: compromised devices could leak corporate credentials, MFA codes, or sensitive enterprise data through hijacked SMS, notification flows, or screen captures. Reliant on phishing webpages The malware continues to leverage social engineering at scale. As before, ClayRat masquerades as legitimate, widely used applications and services, including major video and messaging platforms, as well as localised or regional services (for example, certain Russian taxi or parking apps). Distribution remains heavily reliant on phishing webpages and sideloaded APKs, including via cloud-storage platforms such as Dropbox. According to zLabs telemetry, more than 700 unique APKs tied to ClayRat have already been identified in a short time window. BYOD environments “ClayRat’s evolution shows exactly why enterprises need protection that works at the device level, not just network-based,” said Vishnu Pratapagiri, lead researcher at zLabs. “By abusing Accessibility Services and overlay tricks, this variant turns Android devices into fully compromised endpoints and conventional defenses may not be enough.” As ClayRat continues to evolve, expanding its spyware, remote-control, and lock-screen manipulation capabilities, enterprises should treat this campaign as a critical reminder: mobile devices, especially in BYOD environments, remain among the most vulnerable entry points for attackers. Zimperium continues to monitor ClayRat and share relevant indicators of compromise with industry partners.
Zimperium, the world's pioneer in mobile security, now announced that Alistaire Davidson has joined the company as Chief Financial Officer, reporting directly to CEO Shridhar Mittal. Alistaire brings more than 20 years of finance leadership experience across private equity–backed and public software companies. Alistaire most recently served as Regional CFO, Americas at The Access Group, where he led the post-acquisition integration of two strategic business units. Prior to The Access Group, he held progressive finance leadership roles at AVEVA, supporting the company’s SaaS transition across the Americas and driving a global services transformation that delivered significant margin improvements. Zimperium’s continued expansion “Alistaire’s deep financial expertise and proven ability to scale global software organizations make him a strong addition to our leadership team,” said Shridhar Mittal, CEO of Zimperium. “As demand for mobile security continues to accelerate worldwide, his leadership will be instrumental in guiding Zimperium through our next phase of growth.” As CFO, Alistaire will oversee financial strategy, planning, operations, and performance management to support Zimperium’s continued expansion across global markets.