This Dangerous Spyware Can Take Full Control of Your iPhone or Android – Are You at Risk?

iVerify discovers commercial spyware platform sold on Telegram that gives criminals nation-state surveillance powers for pocket change

Annemarije de Boer Avatar
Annemarije de Boer Avatar

By

Our editorial process is built on human expertise, ensuring that every article is reliable and trustworthy. AI helps us shape our content to be as accurate and engaging as possible.
Learn more about our commitment to integrity in our Code of Ethics.

Image: heute.at

Key Takeaways

Key Takeaways

  • ZeroDayRAT sells nation-state spyware capabilities to amateur criminals through Telegram platforms
  • SMS phishing links install complete device surveillance targeting Android 5-16 and iOS 26
  • Official app stores and iOS Lockdown Mode block democratized spyware attacks

ZeroDayRAT brings elite surveillance tools to amateur cybercriminals via simple SMS links

Your phone becomes a surveillance device the moment you click the wrong text link. Security firm iVerify discovered ZeroDayRAT in February 2026—a commercial spyware platform sold openly on Telegram that grants complete remote control over Android devices (versions 5-16) and iPhones (up to iOS 26, including the iPhone 17 Pro). What once required nation-state resources now costs pocket change and works through basic SMS phishing. This represents a dangerous shift where sophisticated surveillance tools, previously limited to government agencies, are now accessible to virtually anyone with criminal intent.

How Attackers Reach Your Device

Infection starts with familiar-looking messages and fake app downloads that exploit your daily communication habits.

The primary attack vector hits your text messages directly. Criminals send smishing links that appear legitimate—maybe a “security update” or “package delivery” notification that mimics trusted services. Click the link, download what looks like a normal app, and ZeroDayRAT installs silently on your device. The malware also spreads through:

  • Fake app stores
  • Phishing emails
  • Suspicious links shared on WhatsApp or Telegram platforms

Your guard drops because these messages look exactly like legitimate notifications you receive daily from banks, delivery services, or app providers.

Complete Device Takeover Capabilities

Dashboard control gives attackers real-time access to everything stored on your smartphone and personal data.

ZeroDayRAT’s web dashboard makes Hollywood hacking scenes look amateur by comparison. Attackers monitor your device model, battery level, GPS location history, and detailed app usage patterns in real-time through an organized interface. They stream live video from both front and rear cameras, record your screen activity, capture every keystroke, including passwords, and access your microphone whenever they choose.

The financial theft modules specifically target cryptocurrency wallets like MetaMask, Trust Wallet, Binance, and Coinbase, logging account balances and hijacking clipboard contents during transactions. Banking applications face sophisticated overlay attacks that steal login credentials from Google Pay, PhonePe, Apple Pay, and PayPal through fake login screens.

Protection Against Amateur Spies

Official app stores and built-in security features provide your strongest defense against this democratized threat.

iVerify researchers emphasize that “ZeroDayRAT represents a significant escalation in the commoditization” of elite spyware, making advanced surveillance “accessible to virtually anyone” with minimal technical skills. Your protection strategy should treat every SMS link with the same suspicion you’d show a stranger offering free Wi-Fi at the airport.

  • Download applications exclusively from official app stores like Google Play or Apple’s App Store
  • Enable iOS Lockdown Mode or Android’s Advanced Protection Program immediately
  • Never install applications from text message links, regardless of how legitimate they appear

The democratization of nation-state spyware tools means your personal operational security now matters as much as any government official’s daily digital hygiene. Protecting your phone security has become a critical skill in the age of commoditized surveillance.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →