FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

New Spyware ZeroDayRAT Tracks Location and Steals Banking Data

Gregory Zuckerman
Last updated: February 10, 2026 9:06 pm
By Gregory Zuckerman
Technology
7 Min Read
SHARE

A newly surfaced Android spyware toolkit dubbed ZeroDayRAT is being peddled to cybercriminals and promises sweeping control over victims’ phones — from live location and camera feeds to banking credentials and one-time passcodes. Mobile security researchers who analyzed the tool warn that even low-skilled attackers can use it to mount high-impact theft and surveillance campaigns.

What Researchers Found Inside the ZeroDayRAT Spyware Toolkit

According to a technical breakdown from iVerify, ZeroDayRAT is being marketed and distributed through Telegram channels. The kit targets Android devices running versions 5 through 16 and relies on convincing a victim to install a malicious APK. Once installed, an operator-facing dashboard exposes a trove of device and personal data with minimal effort.

Table of Contents
  • What Researchers Found Inside the ZeroDayRAT Spyware Toolkit
  • Why Banking and Cryptocurrency Users Face Elevated Risk
  • How ZeroDayRAT Spreads and Which Victims Are Being Targeted
  • Why This Feels Like a Turning Point for Mobile Surveillance
  • What You Can Do Now to Protect Your Phone and Finances
  • What We Still Don’t Know About the ZeroDayRAT Capabilities
ZeroDayRAT spyware tracking device location and stealing bank account details

The dashboard enumerates phone model and OS details, SIM information, installed apps, and a complete log of incoming notifications. It can track a target’s location in real time, list all accounts registered on the device, and read SMS — including OTP codes often used for two-factor authentication. Researchers say the tool also enables live access to the microphone and cameras and can stream the device’s screen to the attacker.

While the current spotlight is on Android, investigators note that iOS modules are also being advertised to buyers, signaling an intent to operate across mobile ecosystems. Details on iOS capabilities remain limited, but the cross-platform sales pitch underscores the commercial surveillance trend now seeping into commodity crimeware.

Why Banking and Cryptocurrency Users Face Elevated Risk

ZeroDayRAT’s data access translates directly into financial risk. With notification logs, SMS reads, and potential keylogging or screen streaming, attackers can capture banking app credentials and intercept OTPs to bypass login protections. iVerify’s analysis also highlights clipboard manipulation — a tactic commonly used to swap cryptocurrency wallet addresses at the moment of transfer, silently diverting funds.

Security firms have long warned that Android banking threats increasingly blend multiple techniques: overlay attacks that mimic real app screens, Accessibility Service abuse to read content, and notification interception to grab codes. ZeroDayRAT packages many of the same outcomes behind a slick operator console, lowering the barrier to monetization for would-be thieves.

The wider risk context is sobering. The FBI’s Internet Crime Complaint Center continues to report record cybercrime losses, and blockchain investigators such as Chainalysis have flagged address-replacement malware as a persistent theft vector in the crypto ecosystem. Toolkits like ZeroDayRAT make such schemes easier to scale.

How ZeroDayRAT Spreads and Which Victims Are Being Targeted

Distribution through Telegram suggests operators are leaning on social engineering to drive installs: phishing messages, “urgent” support chats, or promises of cracked apps pushing victims to sideload an APK. Once the user taps install and grants requested permissions, the attacker’s dashboard lights up with live telemetry.

This is classic malware-as-a-service. Rather than building their own spyware, buyers pay for access to a ready-made kit and a control panel. Even if specific Telegram channels get taken down, copies in the wild can keep circulating among subgroups and private chats, sustaining the threat.

A persons hands holding a smartphone displaying red code on the screen, with a SECURITYWEEK logo in the top right corner, set against a blurred background of red and blue lights.

Why This Feels Like a Turning Point for Mobile Surveillance

Investigators note that capabilities once associated with nation-state implants — live mic and camera access, granular account discovery, and real-time screen streaming — are now packaged for the criminal market. That democratization of surveillance tradecraft mirrors trends seen with other mobile families, from banking trojans like Xenomorph and Anatsa to commercially sold spy suites.

The protective net is imperfect. Google reports blocking well over 2 million policy-violating submissions to the Play ecosystem annually, and Play Protect can scan some sideloaded packages in real time. But if a victim explicitly installs a malicious APK and taps through warnings, traditional storefront defenses may be bypassed.

What You Can Do Now to Protect Your Phone and Finances

Only install apps from trusted sources and avoid sideloading APKs sent over messaging apps, email, or social media. If you must sideload, validate the developer, verify checksums where possible, and scrutinize requested permissions — especially Accessibility, Notification access, SMS, and Device Admin.

Enable Google Play Protect and heed its warnings. Keep Android and Google Play system updates current, and turn on automatic updates for core apps. Review your device’s permission settings and revoke access that an app doesn’t clearly need to function.

For banking and crypto, use app-based authenticators or security keys instead of SMS when available. Before confirming a crypto transfer, double-check that the destination address matches your intended recipient; clipboard hijacking often changes only a few characters in the middle, hoping you won’t notice.

If you suspect infection, disconnect from networks, back up personal photos and documents, and perform a factory reset. Afterward, change passwords from a clean device, revoke logged-in sessions for email and financial accounts, and re-enable 2FA. Enterprises should consider mobile threat defense tools and restrict sideloading via MDM policies.

What We Still Don’t Know About the ZeroDayRAT Capabilities

Open questions remain around ZeroDayRAT’s persistence methods, whether it employs root exploits, and how it evades mobile security tools. The sellers’ claims about iOS support also need independent validation. What is clear is the direction of travel: full-spectrum mobile surveillance is no longer the realm of elite operators — it’s being commoditized and marketed in chat rooms.

The best defense is vigilance. Treat unexpected app installs and permission prompts as red flags, and assume that anything granting access to messages, notifications, or screen content could be weaponized against your money and your privacy.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
Anker Nebula Capsule 3 Sees $150 Price Drop
Lifetime PDF Editor Deal Undercuts Adobe Plans
Top Early Presidents’ Day Dell Deals Go Live
Rivian Updates R2 Rear Door Manual Release Design
Facebook Unveils AI Animated Profiles And Backgrounds
Polls Find Motorola Update Plans Anger Fans
AI Will Smith Spaghetti Test Reaches New Realism
Galaxy S26 Surfaces in Sleek Black in New Leak
AYANEO Opens Next 2 Preorders At Premium Prices
Target Announces BOGO 50% Off Books, Movies, and Games
Exchange Online Flags Legit Emails As Spam
Resume And Interview Tool CareerSprinter Pro Now 89% Off
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.