ZeroDayRAT is a new mobile spyware platform sold openly through Telegram, with activity first observed on February 2, 2026. It targets Android (5–16) and iOS (up to 26), giving attackers one cross-platform tool.
From a browser-based control panel, an operator can monitor and control an infected phone.
The panel supports GPS tracking, notification capture, SMS access (including OTP codes), live camera and microphone feeds, screen recording, and keylogging tied to app context.
It can list accounts registered on the device and includes theft features such as crypto clipboard address swapping and banking overlays for credential capture.
iVerify researchers identified ZeroDayRAT while reviewing the fast-growing market for “ready to run” mobile spyware. After installation, the tool is built so an operator can act without deep technical knowledge.
Delivery often relies on smishing, where a text message pushes a link that leads to a fake app download.
Similar lures can arrive via phishing emails, fake app stores, or links shared in WhatsApp or Telegram chats, ending in an Android APK or an iOS payload.
.webp)
Once installed, an operator can profile the user by viewing device details, SIM and carrier data, app usage, and intercepted messages.
.webp)
With SMS visibility, SMS-based two-factor codes can be exposed and abused, increasing the risk of account takeover and direct financial loss.
Infection mechanism
A typical infection chain starts with a message that creates urgency and sends the target to a download page that looks legitimate.
If the user installs the app, the implant reports into the operator’s dashboard, where the attacker can pull location history, read notifications, and harvest SMS that may include banking alerts and OTP codes.
The overview can show device model, OS version, lock status, country, and a live activity timeline, which speeds up targeting decisions.
Defenders should treat phones like endpoints: stick to official app stores, limit sideloading, and verify links received by text before tapping.
Use stronger MFA than SMS where possible, rotate passwords after suspected exposure, and investigate sudden permission prompts, battery drain, or unknown accessibility services.
For organizations, add mobile threat monitoring and a clear process to triage suspected spyware. Rapid reporting can limit damage.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.




