Emerging ZeroDayRAT Spyware Threatens Android and iOS Devices

Related

Lotus Blossom Hackers Compromised Notepad++ Hosting Infrastructure to Deliver Malware

What happened The state-sponsored threat group Lotus Blossom breached the...

Lithuania Launches National Initiative to Counter AI-Driven Cyber Fraud

What happened Lithuania has launched a government-funded national initiative aimed...

ClickFix Attack Abuses nslookup to Deliver PowerShell Malware via DNS

What happened Threat actors have introduced a new ClickFix attack...

Snail Mail Phishing Campaign Targets Trezor and Ledger Crypto Wallet Users

What happened Threat actors have launched a phishing campaign using...

Share

What happened

Security researchers have identified a new mobile spyware platform called ZeroDayRAT that is being openly marketed on Telegram, offering attackers full remote access to compromised Android and iOS devices, enabling data theft and real-time surveillance.

Who is affected

Android devices from version 5 up through Android 16 and iOS devices up to version 26 (including the latest models) are susceptible once the spyware is installed, with infection vectors including smishing, phishing emails, fake app marketplaces, and social engineering.

Why CISOs should care

ZeroDayRAT represents a significant shift in the mobile threat landscape: it combines deep device compromise, extensive data exfiltration, and commercial availability, lowering the barrier for attackers to infiltrate enterprise and employee devices. The toolkit provides operators a dashboard to monitor location, messages, notifications, app usage, and account details, increasing risks to corporate data, identity integrity, and financial assets.

3 practical actions

  1. Strengthen mobile security policies: Enforce mobile device management (MDM) and restrict installation of unvetted apps; require app store downloads only from trusted sources.
  2. Enhance user awareness training: Educate employees about smishing, phishing, and social engineering tactics that deliver malicious payloads.
  3. Monitor and respond to anomalies: Deploy mobile threat detection tools and investigate unusual device behaviors (unexpected access requests, high data transmission, location anomalies).