Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Location-Based Gaming NFTs: How GPS and Blockchain Are Changing the Way We Play

May 2, 2026

ZachXBT Exposes US Law Firm Gerstein Harrow’s $71M Grab of Stolen Lazarus Funds

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»New Mobile Spyware ZeroDayRAT Targets Android and iOS
New Mobile Spyware ZeroDayRAT Targets Android and iOS
Security

New Mobile Spyware ZeroDayRAT Targets Android and iOS

February 10, 2026No Comments3 Mins Read

A new mobile spyware operation known as ZeroDayRAT has been documented targeting both Android and iOS devices.

The cross-platform tool provides attackers with persistent access to personal communications, precise location data and banking activity.

According to a new advisory published by iVerify, what’s new is the breadth of control offered to operators and how easily infections can be initiated.

To compromise a device, an attacker must simply persuade a victim to install a malicious binary, typically an Android APK or an iOS payload.

Smishing remains the most common lure, with text messages pushing links to fake but convincing apps. Phishing emails, counterfeit app stores and links shared through WhatsApp or Telegram have also been observed.

Device Overview, User Profiling and Financial Theft

Once infected, the first screen presented to an operator is an extensive overview of the device via a dedicated web-based dashboard.

Hardware details, operating system version, battery status, country, SIM and carrier information and lock status are displayed alongside app usage broken down by time.

Recent SMS messages and a live activity timeline appear in the same view, allowing rapid profiling of the user’s habits and contacts.

Scrolling through the overview reveals intercepted messages from banks, mobile carriers and personal contacts. This single panel can show who the user communicates with most, when the device is active and which networks it connects to. From there, operators can pivot into more detailed data streams.

Separate tabs expose additional surveillance capabilities. GPS data is plotted on an embedded Google Maps view with full location history.

Notifications are captured passively, including alerts from WhatsApp, Instagram, Telegram, YouTube, missed calls and system events, without opening any apps.

See also  Fraudsters Exploit Telegram’s Popularity For Toncoin Scam

Read more on mobile spyware: ClayRat Android Spyware Expands Capabilities

ZeroDayRAT also includes dedicated financial theft modules:

  • A crypto stealer that detects wallets and injects attacker-controlled clipboard addresses

  • A banking stealer targeting online banking apps, UPI platforms such as PhonePe and Google Pay and services including Apple Pay and PayPal via overlay attacks

A Persistent and Growing Threat

iVerify said the platform represents a complete mobile compromise toolkit that once required nation-state resources.

It is now marketed through Telegram channels, offering buyers access to a target’s location, messages, finances, camera, microphone and keystrokes across Android and iOS.

iVerify warned that compromised employee devices pose serious risks for credential theft, account takeover and data exfiltration.

“For enterprises, a compromised employee device is a vector for credential theft, account takeover, and data exfiltration,” the team said. “For individuals, it means total loss of privacy and direct financial exposure. Mobile device security needs to be treated with the same urgency as endpoint and email security.”

They added that detecting threats like ZeroDayRAT requires mobile EDR capabilities that extend beyond traditional device management, combining on-device detection, mobile forensics and automated response across both managed and BYOD environments.

Source link

Android iOS Mobile Spyware Targets ZeroDayRAT

Related Posts

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026

How Mobile Apps Are Quietly Adopting Web3 Tech

May 2, 2026
Top Posts

Tamarack Valley Energy: Counting Down To Additional Dividends In 2024

October 9, 2023

SEC’s Motion to Appeal Loss in Ripple Case Is Denied

October 4, 2023

Chainalysis Launches Plans to Crack Down on Crypto Scams

March 6, 2026

Type above and press Enter to search. Press Esc to cancel.