Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

World Leaks Ransomware Adds Custom Malware ‘RustyRocket’ to Attacks

February 12, 2026

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

February 12, 2026

Time to Exploit Plummets as N-Day Flaws Dominate

February 12, 2026
Facebook X (Twitter) Instagram
Thursday, February 12
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»New Mobile Spyware ZeroDayRAT Targets Android and iOS
Cyber Security

New Mobile Spyware ZeroDayRAT Targets Android and iOS

Team-CWDBy Team-CWDFebruary 10, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new mobile spyware operation known as ZeroDayRAT has been documented targeting both Android and iOS devices.

The cross-platform tool provides attackers with persistent access to personal communications, precise location data and banking activity.

According to a new advisory published by iVerify, what’s new is the breadth of control offered to operators and how easily infections can be initiated.

To compromise a device, an attacker must simply persuade a victim to install a malicious binary, typically an Android APK or an iOS payload.

Smishing remains the most common lure, with text messages pushing links to fake but convincing apps. Phishing emails, counterfeit app stores and links shared through WhatsApp or Telegram have also been observed.

Device Overview, User Profiling and Financial Theft

Once infected, the first screen presented to an operator is an extensive overview of the device via a dedicated web-based dashboard.

Hardware details, operating system version, battery status, country, SIM and carrier information and lock status are displayed alongside app usage broken down by time.

Recent SMS messages and a live activity timeline appear in the same view, allowing rapid profiling of the user’s habits and contacts.

Scrolling through the overview reveals intercepted messages from banks, mobile carriers and personal contacts. This single panel can show who the user communicates with most, when the device is active and which networks it connects to. From there, operators can pivot into more detailed data streams.

Separate tabs expose additional surveillance capabilities. GPS data is plotted on an embedded Google Maps view with full location history.

Notifications are captured passively, including alerts from WhatsApp, Instagram, Telegram, YouTube, missed calls and system events, without opening any apps.

Read more on mobile spyware: ClayRat Android Spyware Expands Capabilities

ZeroDayRAT also includes dedicated financial theft modules:

  • A crypto stealer that detects wallets and injects attacker-controlled clipboard addresses

  • A banking stealer targeting online banking apps, UPI platforms such as PhonePe and Google Pay and services including Apple Pay and PayPal via overlay attacks

A Persistent and Growing Threat

iVerify said the platform represents a complete mobile compromise toolkit that once required nation-state resources.

It is now marketed through Telegram channels, offering buyers access to a target’s location, messages, finances, camera, microphone and keystrokes across Android and iOS.

iVerify warned that compromised employee devices pose serious risks for credential theft, account takeover and data exfiltration.

“For enterprises, a compromised employee device is a vector for credential theft, account takeover, and data exfiltration,” the team said. “For individuals, it means total loss of privacy and direct financial exposure. Mobile device security needs to be treated with the same urgency as endpoint and email security.”

They added that detecting threats like ZeroDayRAT requires mobile EDR capabilities that extend beyond traditional device management, combining on-device detection, mobile forensics and automated response across both managed and BYOD environments.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTop IRS scams to look out for in 2026
Next Article Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package
Team-CWD
  • Website

Related Posts

Cyber Security

NCSC Issues Warning Over “Severe” Cyber-Attacks Targeting CNI

February 10, 2026
Cyber Security

Two Connecticut Men Charged In Alleged $3m Gambling Fraud Scheme

February 9, 2026
Cyber Security

VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code

February 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why you should never pay to get paid

September 15, 2025

How it preys on personal data – and how to stay safe

October 23, 2025

Common Apple Pay scams, and how to stay safe

January 22, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.