Emerging ZeroDayRAT Spyware Threatens Android and iOS Devices

Related

Cybersecurity Leaders to Watch in Illinois Financial Services Industry

Illinois remains one of the country’s most important financial...

Cybersecurity Leaders to Watch in California’s Video Game Industry

California’s video game industry runs on always-on platforms, global...

Cybersecurity Leaders to Watch in California’s Media & Entertainment Industry

California’s media and entertainment sector depends on cybersecurity leaders...

Cybersecurity Leaders to Watch in California’s Insurance Industry

California’s insurance sector depends on cybersecurity leaders who can...

CISOs to Watch in California’s Automotive Industry

California’s automotive sector is being reshaped by electrification, connected...

Share

What happened

Security researchers have identified a new mobile spyware platform called ZeroDayRAT that is being openly marketed on Telegram, offering attackers full remote access to compromised Android and iOS devices, enabling data theft and real-time surveillance.

Who is affected

Android devices from version 5 up through Android 16 and iOS devices up to version 26 (including the latest models) are susceptible once the spyware is installed, with infection vectors including smishing, phishing emails, fake app marketplaces, and social engineering.

Why CISOs should care

ZeroDayRAT represents a significant shift in the mobile threat landscape: it combines deep device compromise, extensive data exfiltration, and commercial availability, lowering the barrier for attackers to infiltrate enterprise and employee devices. The toolkit provides operators a dashboard to monitor location, messages, notifications, app usage, and account details, increasing risks to corporate data, identity integrity, and financial assets.

3 practical actions

  1. Strengthen mobile security policies: Enforce mobile device management (MDM) and restrict installation of unvetted apps; require app store downloads only from trusted sources.
  2. Enhance user awareness training: Educate employees about smishing, phishing, and social engineering tactics that deliver malicious payloads.
  3. Monitor and respond to anomalies: Deploy mobile threat detection tools and investigate unusual device behaviors (unexpected access requests, high data transmission, location anomalies).