Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ZeroDayRAT: New Spyware Targeting Android and iOS

ZeroDayRAT: New Spyware Targeting Android and iOS

Posted on February 16, 2026 By CWS

ZeroDayRAT, a newly surfaced mobile spyware, is making waves by offering a comprehensive surveillance tool for targeting both Android and iOS platforms. Discovered on February 2, 2026, it is distributed openly via Telegram, posing a significant threat to mobile device security.

What is ZeroDayRAT?

This malicious platform provides a browser-based interface that allows operators to manage compromised devices. It enables full-scale monitoring, including GPS tracking, capturing notifications, and accessing SMS messages, even those containing OTP codes. Additionally, it allows live feeds from cameras and microphones, and includes features like screen recording and keylogging, which are linked to specific app contexts.

How ZeroDayRAT Operates

Once installed, the spyware can list accounts associated with the device and perform actions like cryptocurrency address swapping and using banking overlays to steal credentials. The tool has been identified by iVerify researchers as part of a growing trend in “ready to run” mobile spyware, which requires minimal technical expertise from the user.

The spyware is often delivered through smishing attacks, where victims receive deceptive text messages that lead them to download malicious apps. These tactics are also employed via phishing emails, fake app stores, or through links shared in messaging apps like WhatsApp or Telegram.

Security Implications and Defense Strategies

Upon installation, ZeroDayRAT provides operators with a detailed user profile, including device specifics and intercepted communications. This access can lead to severe consequences, such as SMS-based two-factor authentication codes being exploited, paving the way for account takeovers and financial losses.

To combat these threats, users should only download apps from official stores, avoid sideloading, and scrutinize links in messages before clicking. Utilizing stronger multi-factor authentication methods than SMS, rotating passwords after suspected breaches, and investigating unusual device behavior can further mitigate risks. Organizations are encouraged to implement mobile threat monitoring and establish a clear protocol for addressing potential spyware incidents swiftly.

Stay informed with technological updates by following us on Google News, LinkedIn, and X. Choose CSN as your primary news source on Google for more insights.

Cyber Security News Tags:Android, cyber threats, Cybersecurity, data protection, data theft, digital security, IOS, mobile security, mobile threats, Phishing, real-time surveillance, Smishing, Spyware, technology news, ZeroDayRAT

Post navigation

Previous Post: Android 17 Beta Enhances Privacy and Security Measures
Next Post: Cyber Threats Unveiled: Outlook Add-Ins and AI Malware

Related Posts

Sitecore CMS Platform Vulnerabilities Enables Remote Code Execution Sitecore CMS Platform Vulnerabilities Enables Remote Code Execution Cyber Security News
TamperedChef Malware as PDF Editor Harvest Browser Credentials and Allows Backdoor Access TamperedChef Malware as PDF Editor Harvest Browser Credentials and Allows Backdoor Access Cyber Security News
Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges Cyber Security News
Critical Roundcube Flaw Allows Email Tracking Critical Roundcube Flaw Allows Email Tracking Cyber Security News
Hackers Attacking Remote Desktop Protocol Services from 100,000+ IP Addresses Hackers Attacking Remote Desktop Protocol Services from 100,000+ IP Addresses Cyber Security News
Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top User Access Management Tools for 2026
  • LinkedIn’s Secret Browser Extension Scan Sparks Privacy Concerns
  • Anthropic Ends Third-Party Tool Access for Claude
  • Hackers Exploit Trusted Platforms to Target Philippine Bank Users
  • China-Linked TA416 Intensifies Cyber Attacks on Europe

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top User Access Management Tools for 2026
  • LinkedIn’s Secret Browser Extension Scan Sparks Privacy Concerns
  • Anthropic Ends Third-Party Tool Access for Claude
  • Hackers Exploit Trusted Platforms to Target Philippine Bank Users
  • China-Linked TA416 Intensifies Cyber Attacks on Europe

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark