Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
Home/Threats/ZeroDayRAT Attacks Android/iOS: Real- Attacking Real-Time
Threats

ZeroDayRAT Attacks Android/iOS: Real- Attacking Real-Time

ZeroDayRAT, a new mobile spyware platform, was first observed in activity on February 2, 2026. Sold openly through Telegram, it targets Android (5–16) and iOS (up to 26), offering attackers a single...

Marcus Rodriguez
Marcus Rodriguez
February 16, 2026 2 Min Read
0 0

ZeroDayRAT, a new mobile spyware platform, was first observed in activity on February 2, 2026. Sold openly through Telegram, it targets Android (5–16) and iOS (up to 26), offering attackers a single cross-platform tool.

From a browser-based control panel, an operator can monitor and control an infected phone.

The panel supports GPS tracking, notification capture, SMS access (including OTP codes), live camera and microphone feeds, screen recording, and keylogging tied to app context.

It can list accounts registered on the device and includes theft features such as crypto clipboard address swapping and banking overlays for credential capture.

iVerify researchers identified ZeroDayRAT while reviewing the fast-growing market for “ready to run” mobile spyware. After installation, the tool is built so an operator can act without deep technical knowledge.

Delivery often relies on smishing, where a text message pushes a link that leads to a fake app download.

Similar lures can arrive via phishing emails, fake app stores, or links shared in WhatsApp or Telegram chats, ending in an Android APK or an iOS payload.

ZeroDayRAT's dashboard with two devices, one in India and the US (Source - iVerify)
ZeroDayRAT’s dashboard with two devices, one in India and the US (Source – iVerify)

Once installed, an operator can profile the user by viewing device details, SIM and carrier data, app usage, and intercepted messages.

Live camera, screen recording, and microphone access from a single panel (Source - iVerify)
Live camera, screen recording, and microphone access from a single panel (Source – iVerify)

With SMS visibility, SMS-based two-factor codes can be exposed and abused, increasing the risk of account takeover and direct financial loss.

Infection mechanism

A typical infection chain starts with a message that creates urgency and sends the target to a download page that looks legitimate.

If the user installs the app, the implant reports into the operator’s dashboard, where the attacker can pull location history, read notifications, and harvest SMS that may include banking alerts and OTP codes.

The overview can show device model, OS version, lock status, country, and a live activity timeline, which speeds up targeting decisions.

Defenders should treat phones like endpoints: stick to official app stores, limit sideloading, and verify links received by text before tapping.

Use stronger MFA than SMS where possible, rotate passwords after suspected exposure, and investigate sudden permission prompts, battery drain, or unknown accessibility services.

For organizations, add mobile threat monitoring and a clear process to triage suspected spyware. Rapid reporting can limit damage.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackphishingThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

CISA Warns: ZLAN ICS Flaws Allow Complete Devices Vulnerabilities

Next Post

Critical Airleader Flaw Allows Remote Code Execution Attacks

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Wireshark Flaws Allow Code Execution via Malformed
May 1, 2026
Anthropic Launches Claude Security Beta for Enterprise
May 1, 2026
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us