Malware News New ‘ZeroDayRAT’ Spyware Kit Enables Total Compromise of iOS, Android Devices

Brownie2019

Level 23
Thread author
Verified
Well-known
Forum Veteran
Mar 9, 2019
920
4,315
2,168
Germany
ZeroDayRAT is a new commercial mobile spyware toolkit that enables full remote access to Android and iOS devices, with features including live camera feeds, key logging, bank and crypto theft and more.

It is currently available via Telegram, and was first observed on February 2, 2026, and since analyzed by iVerify. It is “a complete mobile compromise toolkit” comparable to kits normally requniring nation-state resources to develop.

Infection requires delivery of a malicious binary. “These kits typically give the buyer a self-hosted panel and a builder,” explains Daniel Kelley, research fellow at iVerify. “The operator sets up their own server, configures the panel, then uses the builder to generate payloads that phone home to their infrastructure.”

From there, he continues, “Distribution is on the attacker: phishing links, smishing, trojanized apps on third-party stores, social engineering… whatever works. There’s an ‘exploit’ tab in the sidebar, so it’s possible it comes with some kind of exploit capability, but we can’t confirm it.”

Once installed on the target, capabilities include victim and device profiling (model, OS, battery, country, lock status, SIM and carrier info, dual SIM phone numbers, app usage broken down by time, a live activity timeline, and a preview of recent SMS messages).
Full Story on:
 
Full Story on:
What you quoted matches a pattern we’ve been seeing more often: “commercial” spyware/RAT frameworks marketed in criminal channels, where the buyer gets a panel/builder and then handles delivery themselves (phishing/smishing, trojanized apps, fake updates, etc.). Even when the marketing claims “zero-day,” you generally can’t assume there’s a working exploit chain unless an independent technical write-up confirms it.

Why this matters (practically)
  • If delivery requires installing something (APK/IPA/profile/MDM enrollment), then user interaction and social engineering are often the real “exploit.”
  • Android is typically exposed via sideloaded apps, third‑party stores, Accessibility abuse, notification/SMS lure flows, or device admin tricks (varies by campaign).
  • iOS compromise at scale is harder without an exploit, so many real-world iOS infections rely on configuration profiles, enterprise signing abuse, credential theft, or persuading users to install/“trust” something they shouldn’t.

Defensive takeaways for everyday users
  • Avoid installing apps from links in SMS/DMs. Use only official app stores.
  • On Android: keep “Install unknown apps” disabled; keep Google Play Protect enabled; avoid third‑party app stores.
  • On iPhone: treat any request to install a “profile,” “VPN,” “certificate,” or “device management” as a major red flag unless it’s from your employer/school and you can verify it out-of-band.
  • Keep iOS/Android and all apps fully updated (this closes known exploited bugs, even if a kit claims “zero-day”).
  • Use strong account security (unique passwords + MFA). This doesn’t stop device spyware, but it reduces the damage from credential theft and account takeover paths used alongside these campaigns.

What to do if you suspect a phone is compromised
  • Disconnect from untrusted networks and remove any recently installed/suspicious apps.
  • Check for unusual device management:
    • iOS: Settings → General → VPN & Device Management (remove unknown profiles/MDM).
    • Android: Settings → Security/Privacy → Device admin apps (disable unknown admins); Accessibility (disable suspicious services).
  • Run reputable mobile security scans (helpful for common trojans; not a guarantee against high-end spyware).
  • If risk is credible, the safest path is to back up essential data and perform a full factory reset, then restore selectively (avoid restoring unknown “device management” items or reinstalling questionable apps).
  • For incident response: preserve indicators (screenshots of profiles/apps, SMS lures, URLs) and share them with trusted responders; don’t rely on “it looks fine now” as proof it’s clean.

Bottom line
Treat “commercial mobile spyware kit” reports as credible risk signals, but don’t assume “zero-day” capability without independent technical confirmation. The most effective mitigations remain: block untrusted installs/enrollment, patch aggressively, and respond decisively (profile/app removal and reset when warranted).

Sources
 
Technical Analysis & Remediation

MITRE Mobile ATT&CK Mapping

T1476 (Deliver Malicious App via Other Means)
Distribution via phishing, smishing, and third-party stores.

T1516 (Input Capture)
Logs keystrokes, biometric unlocks, and gestures.

T1430 (Location Tracking)
Real-time GPS plotting on Google Maps.

T1512 (Video/Audio Capture)
Live streaming from front/back cameras and microphone.

T1409 (Stored Data Manipulation)
Clipboard injection for crypto theft.

CVE Profile

Score

N/A (No specific CVEs identified in source telemetry).

Exploit Status
Theoretical. The kit contains an "exploit" tab, but researchers have not confirmed functional exploit capabilities.

Telemetry & Indicators

Distribution Channel

Telegram (Advertised in Portuguese, Russian, Chinese, Spanish, English).

Behavioral IOCs

Battery Drain

Significant reduction in battery life due to continuous surveillance.

Financial Anomalies
Unexplained outbound crypto transactions (clipboard injection) or unauthorized bank logins.

Network Activity
Continuous background data transmission to operator-controlled infrastructure.

Hard IOCs
Source text provides no specific File Hashes, C2 IP addresses, or Registry Keys.

Remediation - THE ENTERPRISE TRACK (NIST CSF 2.0)

GOVERN (GV)

Command

Update Mobile Device Management (MDM) policies to strictly block "Unknown Sources" (Android) and unverified Enterprise Profiles (iOS).

Command
Issue an advisory regarding "Smishing" (SMS Phishing) targeting mobile credentials.

DETECT (DE)

Command

Monitor for mobile endpoints communicating with ephemeral or non-reputation-based IP addresses (Note: Infrastructure is fragmented/self-hosted).

Command
Alert on devices showing rapid battery degradation or high background data usage via MDM telemetry.

RESPOND (RS)

Command

Isolate affected devices from the corporate network immediately.

Command
Do not attempt to "clean" the device. Perform a full Factory Reset or device wipe to ensure removal of persistence mechanisms.

RECOVER (RC)

Command

Revoke and reissue all credentials (banking, email, MFA tokens) accessed on the compromised device after the device has been wiped.

Remediation - THE HOME USER TRACK (Safety Focus)

Priority 1: Prevention

Command

Do not download apps from third-party stores or links sent via SMS/Telegram. Stick to the official Google Play Store and Apple App Store.

Command
Never approve "Configuration Profiles" or "Device Admin" requests from untrusted apps.

Priority 2: Diagnosis

Command

Check Settings > Battery. If an unknown app is consuming a high percentage of power, it is a primary suspect.

Command
Check Settings > Privacy > Permission Manager (Android) or Privacy & Security (iOS). Look for apps with unnecessary access to Camera, Microphone, or Location.

Priority 3: Eradication

Command

If infection is suspected (e.g., crypto theft occurred), perform a Factory Reset immediately. Uninstalling the app may not remove deep persistence.

Command
Reset passwords for banking and crypto wallets using a different, uncompromised device.

Hardening & References

Context

The "ZeroDay" name appears to be marketing tradecraft. The attack relies heavily on the user permitting the installation. High awareness effectively neutralizes the primary delivery vector.

Sources

SecurityWeek

iVerify Blog
 
  • Like
Reactions: harlan4096
Beyond how sophisticated the kit may seem, the greatest vulnerability almost always lies in the user’s excessive trust. Attackers don’t need to break down walls if someone carelessly opens the door for them.

In the end, it’s like having the strongest lock but leaving the key forgotten in the keyhole: technical defense loses its meaning if naivety opens the way. 🕵️‍♂️ 🗝️ 📱