ZeroDayRAT: When Commercial Spyware Becomes a Real-Time Mobile Surveillance Engine
- Javier Conejo del Cerro
- 17 feb
- 3 Min. de lectura

ZeroDayRAT represents a new generation of commercial mobile spyware openly advertised on Telegram, offering buyers a full-featured cross-platform surveillance framework for Android (5–16) and iOS (up to 26). Sold with a builder and self-hosted control panel, the platform enables real-time monitoring, financial theft, and persistent remote control — capabilities that previously required nation-state resources but are now available to any motivated cybercriminal.
The identity of the operators behind ZeroDayRAT remains unknown, but its professional commercialization model, structured sales channels, customer support, and continuous updates indicate an organized cybercrime operation rather than an opportunistic campaign.
Phase 1: Social Engineering & Distribution
ZeroDayRAT does not rely on zero-days. Instead, it abuses trust.
The malware is distributed via:
Phishing campaigns
Fake app marketplaces
Enterprise provisioning abuse (iOS sideloading)
Rogue APK installers
Social engineering lures
Victims are tricked into installing malicious binaries generated through a builder tool provided to buyers. Once installed, the implant registers with a self-hosted command-and-control (C2) panel controlled by the attacker.
This lowers the technical barrier dramatically: operators do not need infrastructure development skills — they simply deploy the panel and start monitoring victims.
Phase 2: Device Profiling & Persistent Access
After infection, ZeroDayRAT performs deep device profiling:
Device model and OS version
SIM and carrier information
Battery status
Installed applications
Notifications preview
SMS messages, including OTP codes
Account enumeration (Google, WhatsApp, Instagram, Telegram, Amazon, PayPal, Spotify, etc.)
GPS coordinates are extracted and plotted on Google Maps, along with historical location tracking.
Persistence mechanisms ensure continuous access, while the centralized panel provides operators with structured visibility into each infected device.
This transforms the malware from a simple data stealer into a persistent surveillance platform.
Phase 3: Real-Time Surveillance
ZeroDayRAT moves beyond passive data collection.
Operators can:
Activate live camera streaming
Capture microphone audio feeds
Log keystrokes
Execute arbitrary commands
Monitor clipboard activity
Unlike older mobile stealers focused purely on credentials, this toolkit enables hands-on-keyboard interaction from a browser tab.
The attacker effectively turns the smartphone into a remote-controlled surveillance device.
Phase 4: Financial Theft & Crypto Targeting
One of the most dangerous modules is its financial theft capability.
ZeroDayRAT includes:
A crypto wallet stealer scanning for MetaMask, Trust Wallet, Binance, Coinbase
Clipboard wallet address replacement to redirect transactions
A banking module targeting Apple Pay, Google Pay, PayPal, PhonePe
OTP interception to bypass two-factor authentication
This combination enables both credential theft and direct transaction hijacking.
Cryptocurrency users are particularly exposed: once seed phrases are stolen, funds are irrecoverable.
Phase 5: The Broader Mobile Threat Ecosystem
ZeroDayRAT does not operate in isolation. Its emergence coincides with:
Android RATs distributed via Hugging Face-hosted APKs
Arsink RAT leveraging Google Apps Script, Firebase, and Telegram
Banking trojans like Anatsa and deVixor
NFC relay malware enabling tap-to-pay fraud (Ghost Tap)
Fake Google Play listings distributing APK-based stealers
WhatsApp screen-sharing scams
ClickFix-based desktop infections linked to mobile campaigns
The commercialization of spyware combined with infrastructure abuse (Telegram, GitHub, Firebase, Google Drive) demonstrates a broader shift: mobile compromise has become modular, scalable, and accessible.
Victims
ZeroDayRAT targets Android and iOS users globally, with particular risk to:
Financially active individuals
Cryptocurrency holders
Corporate executives
Remote workers
High-value mobile users
Because distribution relies on social engineering rather than exploitation, anyone can become a victim.
Measures to Defend Against ZeroDayRAT
To mitigate risk:
Disable sideloading and restrict unofficial app stores
Limit or monitor enterprise provisioning on iOS
Block accessibility abuse and monitor unusual permission requests
Enforce Mobile Threat Defense (MTD) and Mobile Device Management (MDM)
Monitor abnormal OTP access and SMS interception
Detect clipboard manipulation involving wallet addresses
Restrict high-risk apps from accessing camera and microphone
Educate users against fake updates and third-party marketplaces
Apply least-privilege access on mobile endpoints
Monitor anomalous outbound traffic from mobile devices
ZeroDayRAT signals a dangerous shift:
Mobile spyware capabilities once associated with nation-state actors are now sold as turnkey criminal products.
The framework’s modularity, cross-platform support, financial theft features, and real-time surveillance functionality make it more than a data stealer — it is a full mobile compromise ecosystem.
As mobile devices increasingly store authentication tokens, financial assets, corporate data, and identity credentials, their compromise becomes strategically equivalent to endpoint takeover.
The myth that “mobile devices are safer by design” is no longer sustainable.
ZeroDayRAT demonstrates that mobile security must now be treated as a first-class enterprise risk domain — not an afterthought.
The Hacker News




Comentarios