ZeroDayRAT brings elite surveillance tools to amateur cybercriminals via simple SMS links
Your phone becomes a surveillance device the moment you click the wrong text link. Security firm iVerify discovered ZeroDayRAT in February 2026—a commercial spyware platform sold openly on Telegram that grants complete remote control over Android devices (versions 5-16) and iPhones (up to iOS 26, including the iPhone 17 Pro). What once required nation-state resources now costs pocket change and works through basic SMS phishing. This represents a dangerous shift where sophisticated surveillance tools, previously limited to government agencies, are now accessible to virtually anyone with criminal intent.
How Attackers Reach Your Device
Infection starts with familiar-looking messages and fake app downloads that exploit your daily communication habits.
The primary attack vector hits your text messages directly. Criminals send smishing links that appear legitimate—maybe a “security update” or “package delivery” notification that mimics trusted services. Click the link, download what looks like a normal app, and ZeroDayRAT installs silently on your device. The malware also spreads through:
- Fake app stores
- Phishing emails
- Suspicious links shared on WhatsApp or Telegram platforms
Your guard drops because these messages look exactly like legitimate notifications you receive daily from banks, delivery services, or app providers.
Complete Device Takeover Capabilities
Dashboard control gives attackers real-time access to everything stored on your smartphone and personal data.
ZeroDayRAT’s web dashboard makes Hollywood hacking scenes look amateur by comparison. Attackers monitor your device model, battery level, GPS location history, and detailed app usage patterns in real-time through an organized interface. They stream live video from both front and rear cameras, record your screen activity, capture every keystroke, including passwords, and access your microphone whenever they choose.
The financial theft modules specifically target cryptocurrency wallets like MetaMask, Trust Wallet, Binance, and Coinbase, logging account balances and hijacking clipboard contents during transactions. Banking applications face sophisticated overlay attacks that steal login credentials from Google Pay, PhonePe, Apple Pay, and PayPal through fake login screens.
Protection Against Amateur Spies
Official app stores and built-in security features provide your strongest defense against this democratized threat.
iVerify researchers emphasize that “ZeroDayRAT represents a significant escalation in the commoditization” of elite spyware, making advanced surveillance “accessible to virtually anyone” with minimal technical skills. Your protection strategy should treat every SMS link with the same suspicion you’d show a stranger offering free Wi-Fi at the airport.
- Download applications exclusively from official app stores like Google Play or Apple’s App Store
- Enable iOS Lockdown Mode or Android’s Advanced Protection Program immediately
- Never install applications from text message links, regardless of how legitimate they appear
The democratization of nation-state spyware tools means your personal operational security now matters as much as any government official’s daily digital hygiene. Protecting your phone security has become a critical skill in the age of commoditized surveillance.




























