Executive Summary
In early February 2026, cybersecurity researchers identified ZeroDayRAT, a sophisticated mobile spyware platform being sold openly on Telegram. This malware grants attackers full remote control over Android (versions 5 through 16) and iOS devices (up to iOS 26, including the iPhone 17 Pro). Once installed via smishing, phishing emails, or malicious app stores, ZeroDayRAT enables comprehensive surveillance, including GPS tracking, message interception, live camera and microphone access, keylogging, and financial theft targeting banking and cryptocurrency applications. The spyware's user-friendly control panel allows even non-technical operators to exploit compromised devices effectively. (securityweek.com)
The emergence of ZeroDayRAT signifies a concerning trend where advanced surveillance tools, previously accessible only to nation-state actors, are now available to a broader range of cybercriminals. This development underscores the urgent need for enhanced mobile security measures and user vigilance to prevent unauthorized access and data breaches. (securityweek.com)
Why This Matters Now
The proliferation of sophisticated spyware like ZeroDayRAT, now accessible to a wider range of cybercriminals, poses an immediate threat to both individual privacy and organizational security. This underscores the urgent need for enhanced mobile security measures and user vigilance to prevent unauthorized access and data breaches.
Attack Path Analysis
The ZeroDayRAT spyware campaign begins with attackers distributing malicious links via smishing and phishing emails, leading victims to install compromised applications. Once installed, the spyware gains elevated privileges to access sensitive data and device functionalities. It then moves laterally within the device to monitor various applications and services. The malware establishes a command and control channel to transmit collected data to the attackers. Subsequently, it exfiltrates sensitive information, including personal messages, location data, and financial credentials. Finally, the attackers may use the exfiltrated data to perform unauthorized transactions or further exploit the victim's information.
Kill Chain Progression
Initial Compromise
Description
Attackers distribute malicious links via smishing and phishing emails, leading victims to install compromised applications.
MITRE ATT&CK® Techniques
Deliver Malicious App via Other Means
Masquerade as Legitimate Application
Capture SMS Messages
Access Call Log
Capture Audio
Capture Camera
Location Tracking
Commonly Used Port
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure all system components and software are protected from known vulnerabilities
Control ID: 6.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Identity
Control ID: Pillar 1
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Government Administration
ZeroDayRAT mobile spyware poses critical risks to government officials through real-time surveillance capabilities, potentially compromising classified communications and sensitive administrative operations.
Financial Services
Mobile spyware threatens financial institutions through data theft capabilities targeting customer information, transaction details, and privileged access credentials on executive mobile devices.
Health Care / Life Sciences
Healthcare organizations face HIPAA compliance violations as ZeroDayRAT can exfiltrate protected health information from mobile devices used by medical professionals.
Law Enforcement
Law enforcement agencies are vulnerable to operational compromise as mobile spyware can intercept sensitive case information, surveillance data, and confidential communications.
Sources
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Thefthttps://thehackernews.com/2026/02/new-zerodayrat-mobile-spyware-enables.htmlVerified
- Dangerous new spyware can take full control of iPhone and Android deviceshttps://www.techspot.com/news/111293-dangerous-new-spyware-can-take-full-control-iphone.htmlVerified
- New 'ZeroDayRAT' Spyware Kit Enables Total Compromise of iOS, Android Deviceshttps://www.securityweek.com/new-zerodayrat-spyware-kit-enables-total-compromise-of-ios-android-devices/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to the ZeroDayRAT spyware campaign as it can significantly limit the malware's ability to move laterally, escalate privileges, and exfiltrate sensitive data within cloud environments.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While Aviatrix CNSF may not prevent the initial installation of compromised applications, it could limit the malware's ability to communicate with unauthorized external servers.
Control: Zero Trust Segmentation
Mitigation: Aviatrix Zero Trust Segmentation could limit the malware's ability to access sensitive data and critical services by enforcing strict access controls.
Control: East-West Traffic Security
Mitigation: Aviatrix East-West Traffic Security could constrain the malware's ability to move laterally by monitoring and controlling internal traffic flows.
Control: Multicloud Visibility & Control
Mitigation: Aviatrix Multicloud Visibility & Control could limit the malware's ability to establish command and control channels by providing comprehensive monitoring and management of network traffic.
Control: Egress Security & Policy Enforcement
Mitigation: Aviatrix Egress Security & Policy Enforcement could limit the malware's ability to exfiltrate sensitive data by enforcing strict outbound traffic policies.
By constraining the malware's ability to exfiltrate data, Aviatrix CNSF could reduce the potential for attackers to misuse sensitive information.
Impact at a Glance
Affected Business Functions
- Mobile Device Management
- Financial Transactions
- User Privacy
- Corporate Communications
Estimated downtime: 7 days
Estimated loss: $500,000
Personal identifiable information (PII), financial data including banking and cryptocurrency details, real-time location data, and access to camera and microphone feeds.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Egress Security & Policy Enforcement to monitor and control outbound traffic, preventing unauthorized data exfiltration.
- • Utilize Threat Detection & Anomaly Response systems to identify and respond to unusual behaviors indicative of spyware activity.
- • Apply Zero Trust Segmentation to limit the spyware's ability to move laterally within the device.
- • Ensure Encrypted Traffic (HPE) is used to protect data in transit, reducing the risk of interception.
- • Enhance Multicloud Visibility & Control to detect and manage threats across different cloud environments.



