Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ZeroDayRAT Spyware Threatens Android and iOS Security

ZeroDayRAT Spyware Threatens Android and iOS Security

Posted on February 16, 2026 By CWS

Cybersecurity experts have unveiled a new mobile spyware known as ZeroDayRAT, which poses a significant threat to Android and iOS devices. Publicized on Telegram, this malicious software is capable of extracting sensitive data while enabling real-time surveillance.

Comprehensive Spyware Capabilities

The ZeroDayRAT platform is comprehensive in its design, offering support for Android versions 5 through 16 and iOS versions up to 26. Distributed through social engineering tactics and counterfeit app stores, the spyware is equipped with a builder for generating malicious binaries. Once infected, the malware operates through a self-hosted panel, granting the attacker access to a wealth of device information, including model, location, and app usage.

Beyond data collection, the spyware provides real-time surveillance capabilities. It can track GPS coordinates and offer a historical view of the victim’s locations, effectively transforming the software into a robust tool for continuous monitoring.

Targeting Financial Data and Accounts

ZeroDayRAT’s reach extends into financial theft, equipped with tools to scan for and exploit wallet apps like MetaMask and Trust Wallet. The spyware manipulates clipboard transactions to redirect funds to attacker-controlled wallets. Additionally, it targets various online mobile wallets including Apple Pay and Google Pay.

The spyware’s accounts tab presents a notable threat, enumerating accounts on the infected device across platforms such as Google, WhatsApp, and Facebook. This feature provides attackers with detailed insights into the victim’s digital footprint.

Global Implications and Security Concerns

The emergence of ZeroDayRAT coincides with a rise in mobile malware campaigns. Similar threats have been observed leveraging platforms like Telegram and Discord for malware distribution. For instance, the Arsink RAT exploits Google Apps Script for data exfiltration, highlighting the global reach and evolving tactics of cybercriminals.

Security professionals are increasingly concerned about the sophistication of these threats, which often bypass security measures implemented by major tech companies. The ability of these tools to facilitate widespread data theft and surveillance underscores the critical need for enhanced mobile security protocols.

As these threats continue to evolve, cybersecurity experts stress the importance of vigilance and the adoption of robust security measures to protect personal and organizational data from such pervasive threats.

The Hacker News Tags:Android security, Cybersecurity, data theft, financial theft, iOS security, Malware, mobile spyware, Phishing, real-time surveillance, ZeroDayRAT

Post navigation

Previous Post: Ivanti EPMM Exploited by Single IP with RCE Vulnerability
Next Post: Microsoft Alerts to ClickFix Technique Exploiting DNS Queries

Related Posts

SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers The Hacker News
Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware The Hacker News
ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service The Hacker News
China-Linked Group Targets Singapore Telecom in Cyber Attack China-Linked Group Targets Singapore Telecom in Cyber Attack The Hacker News
AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories The Hacker News
Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware
  • Cloud Password Managers Face Security Challenges
  • Noodlophile Malware Uses Fake Jobs to Evade Security
  • Infostealer Targets OpenClaw AI, Exposes Security Flaws
  • AI Assistants Vulnerable to Hidden Memory Manipulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware
  • Cloud Password Managers Face Security Challenges
  • Noodlophile Malware Uses Fake Jobs to Evade Security
  • Infostealer Targets OpenClaw AI, Exposes Security Flaws
  • AI Assistants Vulnerable to Hidden Memory Manipulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News