Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ZeroDayRAT: New Spyware Targeting Android and iOS

ZeroDayRAT: New Spyware Targeting Android and iOS

Posted on February 16, 2026 By CWS

ZeroDayRAT, a newly surfaced mobile spyware, is making waves by offering a comprehensive surveillance tool for targeting both Android and iOS platforms. Discovered on February 2, 2026, it is distributed openly via Telegram, posing a significant threat to mobile device security.

What is ZeroDayRAT?

This malicious platform provides a browser-based interface that allows operators to manage compromised devices. It enables full-scale monitoring, including GPS tracking, capturing notifications, and accessing SMS messages, even those containing OTP codes. Additionally, it allows live feeds from cameras and microphones, and includes features like screen recording and keylogging, which are linked to specific app contexts.

How ZeroDayRAT Operates

Once installed, the spyware can list accounts associated with the device and perform actions like cryptocurrency address swapping and using banking overlays to steal credentials. The tool has been identified by iVerify researchers as part of a growing trend in “ready to run” mobile spyware, which requires minimal technical expertise from the user.

The spyware is often delivered through smishing attacks, where victims receive deceptive text messages that lead them to download malicious apps. These tactics are also employed via phishing emails, fake app stores, or through links shared in messaging apps like WhatsApp or Telegram.

Security Implications and Defense Strategies

Upon installation, ZeroDayRAT provides operators with a detailed user profile, including device specifics and intercepted communications. This access can lead to severe consequences, such as SMS-based two-factor authentication codes being exploited, paving the way for account takeovers and financial losses.

To combat these threats, users should only download apps from official stores, avoid sideloading, and scrutinize links in messages before clicking. Utilizing stronger multi-factor authentication methods than SMS, rotating passwords after suspected breaches, and investigating unusual device behavior can further mitigate risks. Organizations are encouraged to implement mobile threat monitoring and establish a clear protocol for addressing potential spyware incidents swiftly.

Stay informed with technological updates by following us on Google News, LinkedIn, and X. Choose CSN as your primary news source on Google for more insights.

Cyber Security News Tags:Android, cyber threats, Cybersecurity, data protection, data theft, digital security, IOS, mobile security, mobile threats, Phishing, real-time surveillance, Smishing, Spyware, technology news, ZeroDayRAT

Post navigation

Previous Post: Android 17 Beta Enhances Privacy and Security Measures
Next Post: Cyber Threats Unveiled: Outlook Add-Ins and AI Malware

Related Posts

UAT-638 Hackers Exploit Cityworks Zero-Day to Attack IIS Servers With VSHell Malware UAT-638 Hackers Exploit Cityworks Zero-Day to Attack IIS Servers With VSHell Malware Cyber Security News
Microsoft Windows Defender Firewall Vulnerabilities Let Attackers Escalate Privileges Microsoft Windows Defender Firewall Vulnerabilities Let Attackers Escalate Privileges Cyber Security News
South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members Cyber Security News
New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs Cyber Security News
Let’s Encrypt Unveils new “Generation Y” root and to 45 day certificates Let’s Encrypt Unveils new “Generation Y” root and to 45 day certificates Cyber Security News
New Clickfix Attack Promises “Free WiFi” But Delivers Powershell Based Malware New Clickfix Attack Promises “Free WiFi” But Delivers Powershell Based Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Airleader Vulnerability Poses Remote Code Execution Risk
  • Palo Alto Networks Finalizes $25B CyberArk Acquisition
  • LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware
  • Cloud Password Managers Face Security Challenges
  • Noodlophile Malware Uses Fake Jobs to Evade Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Airleader Vulnerability Poses Remote Code Execution Risk
  • Palo Alto Networks Finalizes $25B CyberArk Acquisition
  • LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware
  • Cloud Password Managers Face Security Challenges
  • Noodlophile Malware Uses Fake Jobs to Evade Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News