đ§ Related Podcast Episode
Executive Summary
In early February 2026, security researchers at iVerify identified a new mobile spyware platform being sold openly on Telegram that changes the threat landscape for mobile device security. Called ZeroDayRAT, this malware represents something weâve long feared but rarely seen: the full democratization of nation-state surveillance capabilities to anyone willing to pay.
What makes ZeroDayRAT particularly dangerous isnât just its comprehensive feature setâwhich rivals commercial spyware like Pegasus and Predatorâbut its unprecedented accessibility. This is a complete mobile compromise toolkit being marketed through Telegram channels with dedicated customer support, sold to buyers with no vetting whatsoever.
The key facts:
- Targets both Android 5-16 and iOS up to version 26 (including iPhone 17 Pro)- Combines real-time surveillance (camera, microphone, screen) with financial theft- Sold through Telegram with a browser-based control panel requiring zero technical expertise- Buyers can deploy on their own servers for complete operational control
This article provides a comprehensive analysis of ZeroDayRATâs capabilities, how it spreads, how it compares to established commercial spyware, and most importantlyâwhat you can do to protect yourself. Whether youâre a security professional, a journalist, an activist, or simply someone who values their privacy, understanding this threat is essential in 2026.
What Is ZeroDayRAT?
ZeroDayRAT is a mobile surveillance platform first observed on February 2, 2026 by researchers at iVerify, a mobile security company. Unlike traditional malware that focuses on a single objectiveâstealing passwords, exfiltrating files, or mining cryptocurrencyâZeroDayRAT is a complete compromise toolkit that gives operators total control over infected devices.
As iVerify researcher Daniel Kelley put it: âThis represents a complete mobile compromise toolkit, the kind that used to require nation-state investment or bespoke exploit development, now sold on Telegram.â
The platform operates through a browser-based control panel that buyers can host on their own servers. This self-hosted architecture provides operators with:
- Complete control over their infrastructure- No reliance on the developerâs servers- Ability to operate independently after purchase- Reduced forensic trail
The malware itself is generated through a builder provided to buyers, allowing them to create customized payloads for different attack scenarios. The developer maintains dedicated Telegram channels for sales, customer support, and regular updatesâtreating spyware like a legitimate SaaS product.
The Business Model
ZeroDayRAT represents a troubling evolution in how sophisticated surveillance tools reach the market. Traditional commercial spyware vendors like NSO Group (Pegasus), Intellexa (Predator), and RCS Lab (Hermit) sell to government customers through formal contracts, typically with some level of vetting (however imperfect).
ZeroDayRAT eliminates this entirely:
Aspect Traditional Commercial Spyware ZeroDayRAT
Sales Channel Government contracts Telegram marketplace
Buyer Vetting Claimed government customers only None
Support Model Dedicated account teams Telegram customer support
Price Range $500K+ per target (estimated) Unknown (likely commodity pricing)
Operational Model Vendor-hosted or assisted Self-hosted by buyer
This matters because it opens nation-state capabilities to a far broader range of threat actors: domestic abusers deploying stalkerware, corporate espionage operators, criminal enterprises, and anyone else willing to spend money on Telegram.
Complete Capabilities Analysis
ZeroDayRATâs feature set is comprehensive enough to enable complete digital surveillance of a targetâs life. Hereâs what operators can access once a device is infected:
Device Profiling & Identification
Before operators even begin surveillance, they have complete visibility into the infected device:
- Hardware: Device model, manufacturer, specifications- Software: Operating system version (Android 5-16, iOS up to 26)- Status: Battery level, lock status, charging state- Network: Country, carrier, SIM information- Dual SIM: Both phone numbers if applicable- Usage Patterns: App usage breakdown and statistics
This profiling helps operators understand their targetâs digital footprint and plan more sophisticated attacks.
Location Tracking
ZeroDayRAT provides real-time GPS tracking with location coordinates plotted directly on Google Maps within the control panel. Operators can:
- View current location in real-time- Access complete location history- Track movement patterns over time- Correlate location with other surveillance data
For a stalker, domestic abuser, or authoritarian government tracking a dissident, this alone is devastatingâbut itâs just the beginning.
Communication Interception
The platform captures communications across multiple channels:
SMS:
- Full inbox access (read all messages)- Ability to send SMS from victimâs device- OTP interception for 2FA bypass
App Notifications:
- Captures notifications from all installed apps- Includes WhatsApp, Instagram, Telegram, Facebook- Provides message previews even from encrypted apps- Shows sender information and timestamps
This notification capture is particularly insidiousâeven if you use end-to-end encrypted messaging, ZeroDayRAT captures the notification content displayed on your device, bypassing encryption entirely at the endpoint.
Account Enumeration
Operators can see every account registered on the device:
- Google accounts- WhatsApp- Instagram- Facebook- Telegram- Amazon- Flipkart (Indian e-commerce)- PhonePe (Indian payments)- Paytm (Indian payments)- Spotify
This enumeration reveals a targetâs complete digital identity and helps operators plan further compromise of specific services.
Real-Time Surveillance
This is where ZeroDayRAT reaches nation-state territory. Operators can:
Live Camera Access:
- Stream video from front or rear camera- Record without any visual indication- Capture photos silently
Live Microphone:
- Real-time audio streaming- Record conversations in targetâs environment- Capture phone calls
Screen Recording:
- See exactly what the user sees- Capture sensitive app usage- Record passwords as theyâre typed
Imagine the implications: every private conversation, every confidential meeting, every intimate momentâall potentially accessible to an attacker with a web browser.
Keystroke Logging
ZeroDayRAT includes sophisticated keylogging with:
- Complete keystroke capture across all apps- App context showing which application received each input- Millisecond timestamps for forensic-grade logging- Biometric unlock detection- Gesture tracking- App launch logging
This captures not just passwords, but every private message typed, every search query, every note writtenâwith enough metadata to reconstruct exactly how the target uses their device.
Financial Theft Module
Hereâs where ZeroDayRAT diverges from traditional surveillance spyware. While Pegasus and Predator focus on intelligence collection, ZeroDayRAT adds direct financial theft capabilities:
Cryptocurrency Wallet Targeting:
- Scans for cryptocurrency wallets: MetaMask, Trust Wallet, Binance, Coinbase- Clipboard hijacking: Replaces copied wallet addresses with attacker addresses- When you think youâre sending crypto to a friend, youâre sending it to the attacker
Banking Credential Theft:
- Overlay attacks on banking apps- Credential capture through fake login screens- Combined with OTP interception for complete account takeover
This combination of surveillance and financial theft is relatively unique. It suggests the developers are targeting criminals who want both intelligence and profit, or building a platform versatile enough for any buyerâs needs.
How ZeroDayRAT Infects Devices
Understanding infection vectors is crucial for prevention. ZeroDayRAT spreads primarily through social engineering attacks that trick users into installing malicious apps.
Primary Infection Vectors
Smishing (SMS Phishing): The most common infection method. Targets receive text messages containing links that lead to:
- Fake app updates (âYour WhatsApp needs updatingâ)- Package delivery notifications- Banking security alerts- Prize or reward claims
When users click and install the linked âapp,â theyâre actually installing ZeroDayRAT.
Email Phishing: Traditional phishing emails directing users to download malicious apps disguised as:
- Security updates- Productivity tools- Required business applications
Fake App Stores: Malicious websites mimicking legitimate app stores (Google Play, App Store) but serving infected apps. These often rank well in search results for popular app names.
Messaging App Distribution: Links shared through WhatsApp, Telegram, or other messaging platforms, often from compromised contacts or in groups.
iOS-Specific Infections
Appleâs closed ecosystem provides significant protection, but ZeroDayRAT can still reach iOS devices through:
Enterprise Provisioning Abuse: Organizations can distribute apps to employees without going through the App Store. Attackers abuse this capability by:
- Creating fake enterprise certificates2. Tricking targets into installing enterprise profiles3. Distributing malware as âenterprise appsâ
If you see a prompt asking you to trust an enterprise developer you donât recognizeâdonât.
Jailbreak Exploitation: Jailbroken devices lose iOS security protections, making them vulnerable to app installation from any source.
Android-Specific Infections
Androidâs more open architecture creates additional attack surface:
Unknown Sources: Android allows installation from sources outside Google Play, but this must be explicitly enabled. Attackers social-engineer users into:
- Going to Settings â Security2. Enabling âUnknown Sourcesâ or âInstall from unknown appsâ3. Installing the malicious APK
Third-Party App Stores: Alternative Android app stores may host trojanized versions of popular apps.
Direct APK Installation: Links that download APK files directly, often disguised as game mods, free premium apps, or required âupdates.â
What the Malware Looks Like
Once installed, ZeroDayRAT often disguises itself as innocent system utilities:
- Calculator apps- Calendar apps- System Update tools- Battery optimizers- Flash utilities
These disguises help the malware blend in with legitimate apps while requesting extensive permissions.
Comparison: ZeroDayRAT vs. Commercial Spyware Giants
How does ZeroDayRAT compare to the established commercial surveillance vendors? Understanding this context helps appreciate both the threat and the shifting landscape.
Feature Comparison
Capability ZeroDayRAT Pegasus (NSO) Predator (Intellexa) Hermit (RCS Lab)
Platform Support Android 5-16, iOS â¤26 iOS, Android iOS, Android iOS, Android
Zero-Click Exploits Not confirmed Yes Yes Some
Real-Time Surveillance Yes Yes Yes Yes
Financial Theft Yes No No No
OTP Interception Yes Yes Yes Yes
Location Tracking Yes Yes Yes Yes
Keylogging Yes Yes Yes Yes
Sales Model Telegram Government contracts Government contracts Government contracts
Buyer Vetting None Claimed Claimed Claimed
US Sanctions No Entity List OFAC 2024 No
Key Differences
1. Zero-Click vs. Social Engineering
The most sophisticated commercial spyware (Pegasus, Predator) can infect devices with zero-click exploitsâno user interaction required. A specially crafted message to iMessage or WhatsApp can compromise the device silently.
ZeroDayRAT, based on current analysis, appears to require user interaction: clicking a link, installing an app, or granting permissions. This is a significant limitation that makes defense more straightforwardâbut social engineering remains highly effective.
2. Financial Theft Module
Traditional commercial spyware vendors market to governments for intelligence collection. Theyâre not in the business of stealing crypto or bank credentialsâthat would undermine their legitimate-vendor positioning.
ZeroDayRATâs inclusion of financial theft capabilities suggests either:
- Criminal monetization beyond surveillance- Broader buyer appeal (criminals, not just governments)- A feature set designed for maximum versatility
3. Accessibility
This is the critical difference. Pegasus reportedly costs $500,000+ per target and requires government-level relationships. Even if you wanted to buy Pegasus for stalking or corporate espionage, you couldnât.
ZeroDayRATâs Telegram sales model means anyone with the purchase price and basic computer literacy can deploy sophisticated mobile surveillance. This democratization is the real threat.
Regulatory Exposure
The established vendors face increasing legal pressure:
- NSO Group: Placed on US Commerce Department Entity List (2021), subject to multiple lawsuits including from Apple- Intellexa/Predator: Sanctioned by US Treasury OFAC (March 2024) for âenabling targeted and mass surveillanceâ- ZeroDayRAT: Operating in the shadows of Telegram with no regulatory exposure
Despite sanctions, Intellexa was reportedly âresurgentâ by 2025 (per ICIJ investigation). The underground market represented by ZeroDayRAT is even harder to regulate.
How to Detect ZeroDayRAT Infection
While specific Indicators of Compromise (IOCs) for ZeroDayRAT havenât been publicly released, general principles for detecting mobile spyware apply. Hereâs what to watch for:
Behavioral Indicators
These warning signs might indicate your device is compromised:
Battery & Performance:
- Unusual or rapid battery drain- Device overheating when not in heavy use- Slow performance degradation- Frequent crashes or freezes
Network Activity:
- Unexpected cellular data usage- WiFi data spikes with no clear cause- Mobile data usage while device should be idle
Strange Device Behavior:
- Camera or GPS activating unexpectedly- Microphone access indicator appearing randomly (iOS)- Random reboots- Difficulty fully powering off the device- Screen lighting up with no notification
Call Quality:
- Unusual noises during calls (clicking, static)- Echo or distortion- Delays in call connection
Android Detection Checklist
- Check Unknown Sources:
- Settings â Security â Unknown Sources- This should be DISABLED unless you specifically need it2. Review Special App Access:
- Settings â Apps â Special Access â Install unknown apps- Review which apps have this permission- Revoke from any apps that donât need it3. Audit Installed Apps:
- Look for apps you donât remember installing- Check for generic-named apps (Calculator, Calendar, System Update) with excessive permissions- Remove anything suspicious4. Check Accessibility Services:
- Settings â Accessibility- Review what apps have accessibility access- This permission enables extensive device control5. Run Security Scans:
- Install Malwarebytes, Bitdefender, or similar- Perform full device scan- Review any flagged items
iOS Detection Checklist
- Check Device Management:
- Settings â General â VPN & Device Management- You should see no profiles unless your employer/school manages your device- Unknown enterprise profiles are a major red flag2. Review Installed Apps:
- Look for unfamiliar apps on home screen- Check for apps that might be hiding in folders- Enterprise apps appear with âInstalled by [Organization]â label3. Verify No Jailbreak:
- Look for Cydia, Sileo, or other jailbreak-related apps- Jailbreaks remove critical security protections4. Check for Profile-Based Attacks:
- Settings â General â Profiles- Unknown profiles may indicate compromise attempt5. Consider Lockdown Mode (if high-risk):
- Settings â Privacy & Security â Lockdown Mode- Dramatically reduces attack surface- More on this below
Professional Detection Tools
Tool Platform Description Best For
iVerify iOS, Android Mobile EDR with threat detection and forensics Everyone (consumer and enterprise versions)
MVT (Mobile Verification Toolkit) iOS, Android Amnesty Internationalâs forensic tool using public IOCs Technical users, forensic investigation
Malwarebytes Mobile Android Malware scanning and removal Android users wanting free scanning
Bitdefender Mobile Security Android, iOS Real-time protection and spyware detection Users wanting continuous protection
Lookout Security Android, iOS Mobile threat protection Enterprise and consumer
MVT (Mobile Verification Toolkit)
For technical users or incident response, Amnesty Internationalâs MVT provides forensic analysis capabilities:
# Install MVT (requires Python 3.6+)
pip install mvt
# Check Android backup
mvt-android check-backup /path/to/backup
# Check iOS backup (requires iTunes backup)
mvt-ios check-backup /path/to/backup
MVT checks backups against known indicators of compromise from documented spyware campaigns. While ZeroDayRAT-specific IOCs arenât yet available, MVT remains valuable for detecting known threats and will likely be updated as IOCs emerge.
Complete Defense Checklist
This section provides actionable steps for protecting yourself against ZeroDayRAT and similar mobile spyware. Different risk levels require different measures.
For Everyone: Basic Mobile Hygiene
These steps should be standard practice for all smartphone users:
Keep Everything Updated
Platform How to Update
Android Settings â System â Software Update
iOS Settings â General â Software Update
Updates patch security vulnerabilities that spyware exploits. Donât delay them.
Lock Down Unknown Sources (Android)
- Settings â Security â Unknown Sources = OFF- Only enable temporarily when you specifically need to install a legitimate app from outside Play Store- Disable immediately after
Review and Revoke Permissions
Android: Settings â Apps â Permissions iOS: Settings â Privacy
Review each permission category (Location, Camera, Microphone, Contacts) and revoke access from apps that donât need it. Ask yourself: âDoes this app need this permission to function?â
Use Strong Authentication
- Alphanumeric passcode (not 4-6 digit PIN)- Biometrics (Face ID, fingerprint) for convenience- The passcode protects if biometrics fail or while sleeping
Never Click Unsolicited Links
The primary infection vector is social engineering. Treat every unexpected link with suspicion:
- Text from unknown number with link? Delete.- Email about package delivery you werenât expecting? Verify through official app.- Message from friend with uncharacteristic link? Call them to verify.- âSecurity alertâ requiring immediate action? Open the official app directly instead.
Verify Before Installing
- Download apps only from official stores (Google Play, App Store)- Check reviews, download counts, and developer reputation- Be suspicious of apps requesting excessive permissions- If an app asks for accessibility services, question why
For High-Risk Individuals: Enhanced Protection
If youâre a journalist, activist, executive, attorney, government employee, or anyone who might be specifically targeted, additional measures are warranted.
Enable iOS Lockdown Mode (Critical)
For iPhone users facing elevated threats, Lockdown Mode is Appleâs nuclear option:
Settings â Privacy & Security â Lockdown Mode â Turn On Lockdown Mode
What Lockdown Mode does:
- Messages: Blocks most attachments except images; disables link previews- Web Browsing: Disables just-in-time JavaScript compilation and other complex web technologies- Apple Services: Blocks incoming FaceTime calls from people you havenât called before- Connections: Blocks wired connections when device is locked- Profiles: Prevents installation of configuration profiles
Apple states Lockdown Mode âstrictly limits certain functionalities, sharply reducing the attack surface that potentially could be exploited by highly targeted mercenary spyware.â
This will impact your device experienceâsome websites wonât work properly, some features will be disabledâbut for high-risk individuals, this trade-off is worth it.
Deploy Mobile Security Software
Donât rely on manual checks alone. Install a dedicated mobile security app:
- iVerify - Purpose-built for detecting commercial spyware- Lookout - Enterprise-grade mobile threat detection- Bitdefender - Real-time protection across platforms
Use Signal for Sensitive Communications
End-to-end encrypted messaging protects message content in transit. While ZeroDayRAT can capture notifications on infected devices, using Signal means:
- Messages are encrypted until they reach the endpoint- If one device is compromised, conversation history isnât stored on servers- Disappearing messages limit exposure window
Physical Security Matters
- Never leave your device unattended- Be cautious of repair servicesâuse only authorized providers- Consider a secondary âcleanâ device for the most sensitive activities- Disable biometric unlock in high-risk situations (police interactions, border crossings)
Regular Forensic Checks
- Run security scans weekly- Consider periodic MVT analysis- Watch for behavioral indicators (battery, heat, data usage)- If concerned, seek professional forensic analysis
For Organizations: Enterprise Protection
Organizations should implement systematic mobile security:
Deploy Mobile Device Management (MDM)
- Enforce security policies across fleet- Require OS updates within defined timeframe- Block installation from unknown sources- Remote wipe capability for lost/stolen devices
Implement Mobile Threat Defense (MTD)
Real-time threat detection that integrates with MDM:
- Detect malicious apps before they run- Identify network-based attacks- Alert on suspicious device behavior
Security Awareness Training
Users are the primary attack vector. Training should cover:
- Recognizing smishing and phishing attempts- Safe app installation practices- Reporting suspicious messages- Understanding why policies exist
BYOD Security Policies
Personal devices accessing corporate resources need:
- Minimum OS version requirements- Security app installation requirement- Prohibition on jailbreaking/rooting- Container solutions for corporate data
Incident Response Plan
Document procedures for suspected mobile compromise:
- Containment (remove from network)2. Evidence preservation (backup before any changes)3. Forensic analysis (professional if warranted)4. Credential rotation (assume all device credentials compromised)5. Device remediation or replacement
The Bigger Picture: Commercial Spyware in 2026
ZeroDayRAT doesnât exist in isolation. Itâs the latest evolution in a commercial spyware industry that has grown increasingly sophisticatedâand increasingly accessibleâover the past decade.
A Brief History
2010-2015: Early Days
- FinFisher and Hacking Team sell surveillance tools to governments- Tools leak, revealing sales to authoritarian regimes- Citizen Lab begins documenting abuses
2016-2021: Industrialization
- NSO Groupâs Pegasus becomes prominent- Zero-click exploits enable silent infection- July 2021: Pegasus Project reveals 50,000+ surveillance targets
2022-2024: Regulatory Response
- US places NSO Group on Entity List- Treasury sanctions Intellexa/Predator (March 2024)- EU investigates Predator abuses
2025-2026: Fragmentation
- Established vendors restructure to evade sanctions- Underground market grows on Telegram- ZeroDayRAT emerges as accessible alternative
Current Industry Landscape
Despite sanctions and public exposure, the commercial spyware industry continues:
Established Vendors Persist: ICIJ reported in August 2025 that Intellexa was âresurgentâ despite US sanctions. Corporate restructuring and geographic relocation allow continued operation.
Underground Markets Flourish: As noted by BroadChannel and Brandefense, Telegram has become âthe #1 hub for cybercrime in 2025â following closure of traditional forums. Spyware-as-a-service fits naturally in this ecosystem.
Mobile Threats Explode: Malwarebytes reported a 151% increase in Android malware during 2025, with spyware specifically up 147%. Kaspersky documented 12.18 million users encountering mobile threats in Q1 2025 alone.
Regulatory Reality
The regulatory response, while well-intentioned, faces fundamental challenges:
Jurisdiction: Spyware developers operate across borders. US sanctions mean little to a Telegram-based vendor operating from a non-cooperative jurisdiction.
Technical Arms Race: Each patched vulnerability prompts development of new exploits. Security is a continuous battle, not a solved problem.
Demand: Governments, corporations, and criminals want these capabilities. As long as demand exists, supply will follow.
Fragmentation: Sanctions on established vendors push development underground, making tracking and regulation even harder.
What This Means For You
The commercial spyware industry exists because it serves powerful interests. Whether youâre targeted depends on who you are, what you do, and what information you possess.
Most People: Youâre unlikely to face nation-state level targeting. But ZeroDayRATâs accessibility means sophisticated surveillance is no longer limited to governments. A jealous ex-partner, unethical employer, or criminal enterprise can potentially deploy these capabilities.
High-Risk Individuals: If your work or activities might attract targetingâjournalism, activism, legal work, political involvement, executive positionsâyou face genuine risk. The steps in this guide arenât paranoia; theyâre prudent security hygiene.
Everyone: Mobile devices contain our most intimate digital lives. Understanding threats like ZeroDayRAT helps make informed decisions about security trade-offs.
Signs You May Be a Target
Consider your risk level honestly. You may face elevated targeting if you are:
- A journalist, especially covering sensitive topics- [ ] A human rights activist or NGO worker- [ ] A political figure, campaign staff, or government employee- [ ] A corporate executive with access to sensitive information- [ ] An attorney working on high-profile cases- [ ] A researcher in sensitive fields- [ ] An individual in a contentious legal or custody dispute- [ ] Someone who has recently left a relationship with a controlling partner
If two or more apply: Seriously consider iOS Lockdown Mode and professional security assessment.
If You Suspect Infection
If you believe your device may be compromised:
Immediate Steps
- Donât tip off the attacker. Avoid discussing your suspicions on the potentially compromised device. The operator can see everything you type.2. Document everything. Note unusual behaviors with timestamps. This information helps forensic analysts.3. Use a clean device for sensitive communications. Borrow a friendâs phone or buy a prepaid device for immediate needs.4. Donât immediately factory reset. Resetting erases forensic evidence. If possible, get professional analysis first.5. Change critical credentials from a clean device: Email passwords, banking logins, social media accounts. Assume everything on the compromised device is known to the attacker.
Getting Help
Resource Contact Best For
Access Now Digital Security Helpline help@accessnow.org Journalists, activists, human rights defenders
EFF Legal Assistance eff.org/pages/legal-assistance Legal guidance on digital rights
Citizen Lab citizenlab.ca Research and exposure of spyware
FBI IC3 ic3.gov Reporting cybercrime (US)
Domestic Violence Warning
If you suspect stalkerware related to domestic abuse:
â ď¸ Removing spyware may alert your abuser. This could escalate danger.
Before taking any action:
- National Domestic Violence Hotline: 1-800-799-7233- Safety plan first, technical remediation second- Consider working with a domestic violence advocate who can coordinate with technical specialists
Your safety is more important than your phone.
Key Takeaways
- ZeroDayRAT represents a new accessibility threshold. Nation-state surveillance capabilities are now available through Telegram with no buyer vetting.2. The threat is comprehensive. Real-time camera/mic access, GPS tracking, keystroke logging, and financial theft combine into total device compromise.3. Social engineering is the primary vector. Most infections require user actionâclicking links, installing apps, granting permissions. Your behavior is your first defense.4. Defense is possible. Basic hygiene (updates, permission review, link skepticism) protects against most attacks. High-risk individuals should enable iOS Lockdown Mode.5. The industry continues evolving. Sanctions pressure established vendors while underground markets flourish. This threat isnât going away.6. Know your risk level. Most people arenât individually targeted. Those who might be should take proportional precautions.
Your smartphone knows more about you than you might realizeâwhere you go, who you talk to, what you think, what you buy. Protecting it isnât paranoia. Itâs prudent digital hygiene in 2026.
Further Reading
- iVerify: Breaking Down ZeroDayRAT- The Hacker News: New ZeroDayRAT Mobile Spyware Analysis- Apple: About Lockdown Mode- Amnesty International: Mobile Verification Toolkit- EFF: Surveillance Self-Defense
Frequently Asked Questions
Q: Can ZeroDayRAT infect my phone without me clicking anything?
Based on current analysis, ZeroDayRAT appears to require some user interaction (clicking a link, installing an app, granting permissions). This differs from zero-click exploits used by Pegasus. However, the sophistication of social engineering attacks makes âjust donât clickâ harder than it sounds.
Q: Does iOS protect me better than Android?
iOSâs closed ecosystem provides meaningful security advantagesâapps only from App Store, no unknown sources option, tighter sandboxing. However, ZeroDayRAT specifically claims iOS support through version 26. No platform is immune. iOS users should still follow all protective measures and consider Lockdown Mode if high-risk.
Q: I have nothing to hide. Why should I care?
Everyone has something privateâmedical information, financial details, intimate conversations, business discussions. More importantly, privacy isnât just about hiding wrongdoing. Itâs about maintaining autonomy and dignity. Do you want a random Telegram buyer watching your camera feed?
Q: Will factory reset remove the infection?
Usually yesâa full factory reset should remove most malware. However: (1) You lose forensic evidence that could be valuable; (2) If you restore from backup, you might reinstall the malware; (3) Some sophisticated spyware can survive resets through firmware compromise, though this is rare.
Q: How much does ZeroDayRAT cost?
Pricing hasnât been publicly reported. Given the Telegram marketplace model, itâs likely far cheaper than commercial vendors like NSO Group ($500K+ per target), making it accessible to a much broader range of buyers.
Q: My ex is tech-savvy and Iâm worried. What should I do?
Take this seriously. Review the domestic violence warning section above and contact the National DV Hotline before making technical changes. A domestic violence advocate can help you safety plan and coordinate with technical specialists. Your physical safety comes first.
This article will be updated as new information about ZeroDayRAT emerges, including specific Indicators of Compromise when released by security researchers. Stay safe out there.