Technical Analysis & Remediation
MITRE Mobile ATT&CK Mapping
T1476 (Deliver Malicious App via Other Means) Distribution via phishing, smishing, and third-party stores.
T1516 (Input Capture)
Logs keystrokes, biometric unlocks, and gestures.
T1430 (Location Tracking)
Real-time GPS plotting on Google Maps.
T1512 (Video/Audio Capture)
Live streaming from front/back cameras and microphone.
T1409 (Stored Data Manipulation)
Clipboard injection for crypto theft.
CVE Profile
Score
N/A (No specific CVEs identified in source telemetry).
Exploit Status
Theoretical. The kit contains an "exploit" tab, but researchers have not confirmed functional exploit capabilities.
Telemetry & Indicators
Distribution Channel
Telegram (Advertised in Portuguese, Russian, Chinese, Spanish, English).
Behavioral IOCs
Battery Drain
Significant reduction in battery life due to continuous surveillance.
Financial Anomalies
Unexplained outbound crypto transactions (clipboard injection) or unauthorized bank logins.
Network Activity
Continuous background data transmission to operator-controlled infrastructure.
Hard IOCs
Source text provides no specific File Hashes, C2 IP addresses, or Registry Keys.
Remediation - THE ENTERPRISE TRACK (NIST CSF 2.0)
GOVERN (GV)
Command
Update Mobile Device Management (MDM) policies to strictly block "Unknown Sources" (Android) and unverified Enterprise Profiles (iOS).
Command
Issue an advisory regarding "Smishing" (SMS Phishing) targeting mobile credentials.
DETECT (DE)
Command
Monitor for mobile endpoints communicating with ephemeral or non-reputation-based IP addresses (Note: Infrastructure is fragmented/self-hosted).
Command
Alert on devices showing rapid battery degradation or high background data usage via MDM telemetry.
RESPOND (RS)
Command
Isolate affected devices from the corporate network immediately.
Command
Do not attempt to "clean" the device. Perform a full Factory Reset or device wipe to ensure removal of persistence mechanisms.
RECOVER (RC)
Command
Revoke and reissue all credentials (banking, email, MFA tokens) accessed on the compromised device after the device has been wiped.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Prevention
Command
Do not download apps from third-party stores or links sent via SMS/Telegram. Stick to the official Google Play Store and Apple App Store.
Command
Never approve "Configuration Profiles" or "Device Admin" requests from untrusted apps.
Priority 2: Diagnosis
Command
Check Settings > Battery. If an unknown app is consuming a high percentage of power, it is a primary suspect.
Command
Check Settings > Privacy > Permission Manager (Android) or Privacy & Security (iOS). Look for apps with unnecessary access to Camera, Microphone, or Location.
Priority 3: Eradication
Command
If infection is suspected (e.g., crypto theft occurred), perform a Factory Reset immediately. Uninstalling the app may not remove deep persistence.
Command
Reset passwords for banking and crypto wallets using a different, uncompromised device.
Hardening & References
Context
The "ZeroDay" name appears to be marketing tradecraft. The attack relies heavily on the user permitting the installation. High awareness effectively neutralizes the primary delivery vector.
Sources
SecurityWeek
iVerify Blog