Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ZeroDayRAT Spyware Threatens Android and iOS Security

ZeroDayRAT Spyware Threatens Android and iOS Security

Posted on February 16, 2026 By CWS

Cybersecurity experts have unveiled a new mobile spyware known as ZeroDayRAT, which poses a significant threat to Android and iOS devices. Publicized on Telegram, this malicious software is capable of extracting sensitive data while enabling real-time surveillance.

Comprehensive Spyware Capabilities

The ZeroDayRAT platform is comprehensive in its design, offering support for Android versions 5 through 16 and iOS versions up to 26. Distributed through social engineering tactics and counterfeit app stores, the spyware is equipped with a builder for generating malicious binaries. Once infected, the malware operates through a self-hosted panel, granting the attacker access to a wealth of device information, including model, location, and app usage.

Beyond data collection, the spyware provides real-time surveillance capabilities. It can track GPS coordinates and offer a historical view of the victim’s locations, effectively transforming the software into a robust tool for continuous monitoring.

Targeting Financial Data and Accounts

ZeroDayRAT’s reach extends into financial theft, equipped with tools to scan for and exploit wallet apps like MetaMask and Trust Wallet. The spyware manipulates clipboard transactions to redirect funds to attacker-controlled wallets. Additionally, it targets various online mobile wallets including Apple Pay and Google Pay.

The spyware’s accounts tab presents a notable threat, enumerating accounts on the infected device across platforms such as Google, WhatsApp, and Facebook. This feature provides attackers with detailed insights into the victim’s digital footprint.

Global Implications and Security Concerns

The emergence of ZeroDayRAT coincides with a rise in mobile malware campaigns. Similar threats have been observed leveraging platforms like Telegram and Discord for malware distribution. For instance, the Arsink RAT exploits Google Apps Script for data exfiltration, highlighting the global reach and evolving tactics of cybercriminals.

Security professionals are increasingly concerned about the sophistication of these threats, which often bypass security measures implemented by major tech companies. The ability of these tools to facilitate widespread data theft and surveillance underscores the critical need for enhanced mobile security protocols.

As these threats continue to evolve, cybersecurity experts stress the importance of vigilance and the adoption of robust security measures to protect personal and organizational data from such pervasive threats.

The Hacker News Tags:Android security, Cybersecurity, data theft, financial theft, iOS security, Malware, mobile spyware, Phishing, real-time surveillance, ZeroDayRAT

Post navigation

Previous Post: Ivanti EPMM Exploited by Single IP with RCE Vulnerability
Next Post: Microsoft Alerts to ClickFix Technique Exploiting DNS Queries

Related Posts

INTERPOL’s Cybercrime Crackdown Nets 651 Arrests in Africa INTERPOL’s Cybercrime Crackdown Nets 651 Arrests in Africa The Hacker News
Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices The Hacker News
Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks The Hacker News
Cybercriminals Use Fake Apps to Steal Data and Blackmail Users Across Asia’s Mobile Networks Cybercriminals Use Fake Apps to Steal Data and Blackmail Users Across Asia’s Mobile Networks The Hacker News
Infostealer Attack via Docker Highlights Security Risks Infostealer Attack via Docker Highlights Security Risks The Hacker News
Why Your Security Culture is Critical to Mitigating Cyber Risk Why Your Security Culture is Critical to Mitigating Cyber Risk The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit Trusted Platforms to Target Philippine Bank Users
  • China-Linked TA416 Intensifies Cyber Attacks on Europe
  • Urgent Security Alert: Thousands of F5 BIG-IP Devices at Risk
  • Microsoft Reveals Cookie-Based PHP Web Shell Threats
  • Social Engineering Attack Compromises Popular Axios Library

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit Trusted Platforms to Target Philippine Bank Users
  • China-Linked TA416 Intensifies Cyber Attacks on Europe
  • Urgent Security Alert: Thousands of F5 BIG-IP Devices at Risk
  • Microsoft Reveals Cookie-Based PHP Web Shell Threats
  • Social Engineering Attack Compromises Popular Axios Library

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark