Emerging ZeroDayRAT Spyware Threatens Android and iOS Devices

Related

Emerging ZeroDayRAT Spyware Threatens Android and iOS Devices

What happened Security researchers have identified a new mobile spyware...

CISOs & Cybersecurity Leaders to Watch in Italy’s Telecommunications Industry

Italy’s telecommunications sector forms the backbone of national connectivity,...

CISOs to Watch in Italy’s Hospitals & Healthcare Industry

Italy’s healthcare ecosystem is under constant pressure: round-the-clock clinical...

CISOs & Cybersecurity Leaders to Watch in Italy’s Automotive Industry

Italy’s automotive industry stands at the intersection of manufacturing...

Share

What happened

Security researchers have identified a new mobile spyware platform called ZeroDayRAT that is being openly marketed on Telegram, offering attackers full remote access to compromised Android and iOS devices, enabling data theft and real-time surveillance.

Who is affected

Android devices from version 5 up through Android 16 and iOS devices up to version 26 (including the latest models) are susceptible once the spyware is installed, with infection vectors including smishing, phishing emails, fake app marketplaces, and social engineering.

Why CISOs should care

ZeroDayRAT represents a significant shift in the mobile threat landscape: it combines deep device compromise, extensive data exfiltration, and commercial availability, lowering the barrier for attackers to infiltrate enterprise and employee devices. The toolkit provides operators a dashboard to monitor location, messages, notifications, app usage, and account details, increasing risks to corporate data, identity integrity, and financial assets.

3 practical actions

  1. Strengthen mobile security policies: Enforce mobile device management (MDM) and restrict installation of unvetted apps; require app store downloads only from trusted sources.
  2. Enhance user awareness training: Educate employees about smishing, phishing, and social engineering tactics that deliver malicious payloads.
  3. Monitor and respond to anomalies: Deploy mobile threat detection tools and investigate unusual device behaviors (unexpected access requests, high data transmission, location anomalies).