ZeroDayRAT Spyware Targets Android and iOS Devices


ZeroDayRAT emerged as a new cross-platform mobile spyware on February 2, 2026. The tool attacks Android versions 5 through 16 and iOS up to version 26. Attackers sell it openly through Telegram channels with browser-based control panels.

Operators monitor infected phones in real time. They access GPS location, notifications, SMS messages including OTP codes, live camera feeds, microphone audio, screen recordings, and app-specific keylogs. The platform lists registered accounts and supports crypto clipboard hijacking plus banking overlays.

iVerify researchers discovered ZeroDayRAT while analyzing commercial spyware markets. No advanced skills needed after installation. Attackers deploy it through smishing texts, phishing emails, fake app stores, and social media links leading to malicious APKs or iOS payloads.

Spyware Capabilities

The web dashboard provides complete device control. Operators view device model, OS version, SIM carrier, app usage patterns, and location history. Live feeds show camera, microphone, and screen activity simultaneously.

SMS interception exposes banking alerts and two-factor codes. This enables account takeovers and financial fraud. Crypto wallet addresses get swapped during clipboard operations. Fake banking overlays capture credentials directly.

Infection chains create urgency through messages. Links lead to legitimate-looking download pages. Users install rogue apps granting accessibility services and full device permissions.

Source – iVerify

Supported Features

CapabilityAndroid SupportiOS Support
GPS TrackingYesYeskudelskisecurity​
SMS/OTP CaptureFull accessFull access
Live Camera FeedReal-timeReal-time
Microphone RecordingContinuousContinuous
Screen RecordingFull sessionsFull sessions
KeyloggingApp-specificApp-specific
Crypto ClipboardAddress swapAddress swap

Delivery Methods

  • Smishing texts with urgent download links.
  • Phishing emails mimicking HR or IT departments.
  • WhatsApp and Telegram shared malicious links.
  • Fake app stores hosting trojanized applications.
  • Social engineering pages requesting app installs.
Live camera, screen recording, and microphone access from a single panel (Source – iVerify)

Operator Dashboard

Device overview shows lock status, country location, and activity timeline. Multiple infections display simultaneously with India and US examples noted. Profiling speeds targeting decisions for high-value victims.

Once active, implants report to C2 servers automatically. Attackers pull full message histories and notification streams. Battery drain and permission prompts signal compromise.

Defensive Measures

  • Install apps only from Google Play and Apple App Store.
  • Disable sideloading on Android devices.
  • Verify SMS links before clicking, especially urgent ones.
  • Replace SMS 2FA with app-based authenticators.
  • Monitor for unusual battery drain or accessibility grants.
  • Organizations deploy mobile threat detection tools.

Enterprise Risks

“Corporate devices face highest exposure through BYOD policies. Stolen credentials lead to email compromise and data exfiltration. Rapid triage limits damage from suspected infections.” – iVerify

FAQ

What is ZeroDayRAT?

Cross-platform Android/iOS spyware sold via Telegram with real-time control.

Which OS versions suffer?

Android 5-16, iOS up to 26.

How does delivery work?

Smishing, phishing, fake apps through social engineering lures.

What data gets stolen?

SMS/OTPs, GPS, camera/mic feeds, screen recordings, crypto wallets.

How to detect infection?

Battery drain, unknown accessibility services, sudden permission requests.

Enterprise protection steps?

Mobile threat monitoring, app whitelisting, SMS 2FA replacement.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages