TL-2026-0116 HIGH 2026-02-22 Threat Analysis

ZeroDayRAT Commercial Mobile Spyware — Telegram-Sold Cross-Platform Surveillance Kit

Threadlinqs Intelligence 7 min
zerodayratmobile-spywareandroidiostelegramcommercial-spywarebanking-overlaysms-otp-bypasscrypto-clipboardsurveillance

Threat ID: TL-2026-0116 | Severity: HIGH | Status: ACTIVE

Actor: Unknown (Telegram commercial) | Aliases: ZeroDayRAT Developer | Motivation: Financial

MITRE Techniques: 23 | Detections: 9 | IOCs: Behavioral


Full device access. Android and iOS. Camera, mic, GPS, messages — all of it. ZeroDayRAT is a surveillance operator's dream kit.

iVerify disclosed ZeroDayRAT on February 16, 2026 — a fully operational commercial mobile spyware platform supporting Android 5 through 16 and iOS up to 26 (including iPhone 17 Pro), sold through dedicated Telegram channels with customer support and regular updates. The operator sees everything: live camera and microphone feeds, banking overlay attacks, SMS OTP interception, cryptocurrency clipboard hijacking, and complete device surveillance from a browser-based C2 panel requiring no technical expertise. Our analysis of the toolkit revealed nine distinct capability modules that rival state-grade platforms in post-compromise power — the only gap is delivery sophistication.

Bleeping Computer coverage of ZeroDayRAT malware granting operators full access to Android and iOS devices through Telegram-based command infrastructure. Bleeping Computer coverage of ZeroDayRAT malware granting operators full access to Android and iOS devices through Telegram-based command infrastructure.

Executive Summary

Technical Analysis

Platform Architecture

ZeroDayRAT operates on a software-as-a-service model distributed through Telegram. The developer maintains dedicated channels for sales, customer support, and feature updates. Buyers receive access to a browser-based operator dashboard that provides real-time device management — no local installation, no command-line interface, no technical knowledge required.

The dashboard displays infected devices with country indicators, device metadata, and full control interfaces organized by function. Both platforms. Full access. iVerify screenshots show managed devices in India and the United States, with the Indian financial ecosystem (UPI platforms, banking apps) receiving dedicated targeting modules. When we tested the detection queries against MDM telemetry from managed fleets, the permission-combination signal was the most reliable indicator — legitimate apps almost never request this stack simultaneously.

Delivery Mechanisms

ZeroDayRAT does not use zero-day exploits. All delivery relies on social engineering:

  1. Smishing — Primary vector. Text messages containing links to malicious APK downloads (Android) or iOS payload pages disguised as legitimate applications
  2. Phishing emails — Secondary vector for enterprise targeting
  3. Fake app stores — Mimicking legitimate app distribution portals
  4. Messaging lures — Links shared via WhatsApp and Telegram with urgency-creating content

The absence of exploit-based delivery is what separates ZeroDayRAT from state-grade spyware like NSO Pegasus or Cytrox Predator. The drop is less sophisticated, but once the implant lands, it is quiet and effective. Far more accessible, too.

Nine Capability Modules

iVerify's analysis identified nine distinct functional modules:

1. Device Overview and User Profiling. Device model, OS version, battery, country, lock status, SIM and carrier information, dual SIM phone numbers, app usage broken down by time, live activity timeline, and recent SMS preview — all on a single screen. Sufficient to fully profile a target's identity, habits, and network.

2. GPS Location Tracking. Real-time coordinates plotted on embedded Google Maps with full location history. iVerify screenshots show active tracking in Bengaluru, India.

3. Notification Capture. All app notifications intercepted: app name, title, content, timestamp. WhatsApp messages, Instagram notifications, missed calls, Telegram messages, YouTube, and system events — passive visibility into everything on the device without opening any application.

4. Account Enumeration. Every account registered on the device is listed: Google, WhatsApp, Instagram, Facebook, Telegram, Amazon, Flipkart, PhonePe, Paytm, Spotify, and more, with associated usernames and emails. This provides complete account takeover intelligence.

5. SMS Access and OTP Interception. Full inbox access, search capability, and the ability to send messages from the victim's number. Incoming OTP codes from banks and platforms are visible in real time. SMS-based two-factor authentication is completely bypassed.

6. Live Surveillance. Real-time camera streaming (front and rear), screen recording, and microphone feed. Combined with GPS tracking, operators can watch, listen to, and locate a target simultaneously from a single panel tab.

7. Keylogging. Every input captured with app context and millisecond timestamps — biometric unlocks, gestures, keystrokes, application launches. A live screen preview displays alongside keylogger output.

8. Cryptocurrency Stealer. Detects wallet applications (MetaMask, Trust Wallet, Binance, Coinbase), logs wallet identifiers and balances, and performs clipboard address injection — silently replacing copied wallet addresses with attacker-controlled addresses to redirect transfers.

9. Banking Stealer. Overlay attacks targeting banking applications, UPI platforms (PhonePe, Google Pay), Apple Pay, and PayPal. Credential capture through fake login screens rendered on top of legitimate applications.

The Surveillance Is Now Commodity

Market Positioning

ZeroDayRAT represents a definitional shift in the commercial spyware market. The capability hierarchy previously looked like this:

TierExampleDeliveryBuyerCost
State-gradeNSO PegasusZero-click, zero-dayGovernment-only~$8M/deployment
Advanced commercialCytrox PredatorSingle-click exploitGovernment sales~$6M
Government-gradeRCS Lab HermitISP-assisted deliveryGovernment contractsUndisclosed
CommodityZeroDayRATSocial engineeringAny Telegram buyerUnknown (fraction)

The technical capability delta between the state-grade and commodity tiers is narrowing. ZeroDayRAT lacks zero-day exploit chains, but once installed, its surveillance and financial theft capabilities are functionally equivalent. The difference is delivery sophistication, not post-compromise power.

The five-language advertising (Portuguese, Russian, Chinese, Spanish, English) indicates a global customer base. The Indian financial ecosystem targeting (PhonePe, Paytm, Flipkart, UPI) alongside global platforms (PayPal, Apple Pay) suggests the developer serves buyers across South Asia, Latin America, Eastern Europe, and East Asia.

For context, Threadlinqs Intelligence tracks CapraRAT (TL-0106), a nation-state Android RAT attributed to APT36 (Pakistan). ZeroDayRAT provides comparable surveillance capabilities but is commercially available to non-state actors with no vetting, no contract, and no oversight — purchased through a Telegram message. No government contract required. Based on our tracking of 112 threats on the platform, this is the first commodity spyware we have cataloged that matches nation-state post-compromise capabilities across both Android and iOS simultaneously.

iVerify threat research breaking down ZeroDayRAT — a new commercial spyware platform targeting both Android and iOS with full device compromise capabilities. iVerify threat research breaking down ZeroDayRAT — a new commercial spyware platform targeting both Android and iOS with full device compromise capabilities.

Detection

Mobile spyware detection is a different game. Forget traditional endpoint signals. The real tells are excessive permissions, anomalous background activity, accessibility service abuse, and behavioral patterns that no legitimate app would produce.

Threadlinqs Intelligence provides 9 production-ready detection rules for this threat.

Splunk SPL — Sideloaded APK with Excessive Permissions

Hunting sideloaded APKs with spyware-grade permissions in MDM/EMM telemetry:

SPLindex=mdm sourcetype="android_enterprise" OR sourcetype="mdm_app_inventory"
    install_source!="com.android.vending"
| eval perm_camera=if(match(permissions, "(?i)camera"), 1, 0),
       perm_mic=if(match(permissions, "(?i)(record_audio|microphone)"), 1, 0),
       perm_sms=if(match(permissions, "(?i)(read_sms|receive_sms|send_sms)"), 1, 0),
       perm_location=if(match(permissions, "(?i)(fine_location|coarse_location)"), 1, 0),
       perm_accessibility=if(match(permissions, "(?i)accessibility"), 1, 0),
       perm_overlay=if(match(permissions, "(?i)system_alert_window"), 1, 0)
| eval spyware_score = perm_camera + perm_mic + perm_sms + perm_location + perm_accessibility + perm_overlay
| where spyware_score >= 4
| table _time device_id app_name package_name install_source spyware_score permissions
| sort -spyware_score
Legitimate applications rarely require camera, microphone, SMS, location, accessibility, and overlay permissions simultaneously. A spyware score of 4 or higher from a sideloaded source warrants immediate investigation.

Splunk SPL — Cryptocurrency Clipboard Hijacking Pattern

Catches clipboard hijacking where crypto wallet addresses get swapped mid-copy:
SPLindex=endpoint sourcetype="mobile_edr" OR sourcetype="mdm_events"
    event_type="clipboard_access" OR event_type="clipboard_modification"
| eval is_crypto_pattern=if(match(clipboard_content,
    "^(0x[a-fA-F0-9]{40}|[13][a-km-zA-HJ-NP-Z1-9]{25,34}|bc1[a-z0-9]{25,90})$"), 1, 0)
| where is_crypto_pattern=1
| stats count dc(clipboard_content) as unique_addresses
    values(app_name) as accessing_apps by device_id
| where count > 2 AND unique_addresses > 1
| table device_id accessing_apps count unique_addresses

Microsoft KQL — Accessibility Service Abuse Detection

A sideloaded app enabling an accessibility service is the strongest single indicator of mobile spyware. This one catches it:
KQLlet known_accessibility_apps = dynamic([
    "com.google.android.marvin.talkback",
    "com.android.switchaccess",
    "com.samsung.accessibility"
]);
DeviceEvents
| where Timestamp > ago(7d)
| where ActionType == "AccessibilityServiceEnabled"
| where AppPackageName !in (known_accessibility_apps)
| where AppInstallSource != "com.android.vending"
| project Timestamp, DeviceName, AppPackageName, AppName,
    AppInstallSource, DeviceId
| sort by Timestamp desc

Microsoft KQL — SMS OTP Interception Pattern

Correlates SMS reads from non-messaging apps against authentication events — the classic OTP interception pattern:
KQLDeviceEvents
| where Timestamp > ago(7d)
| where ActionType in ("SmsRead", "SmsReceived")
| where InitiatingProcessFileName !in ("com.google.android.apps.messaging",
    "com.samsung.android.messaging", "com.android.mms")
| join kind=inner (
    SigninLogs
    | where TimeGenerated > ago(7d)
    | where AuthenticationMethodsUsed has "SMS"
    | project AuthTimestamp=TimeGenerated, UserPrincipalName, IPAddress, Location
) on $left.DeviceId == $right.DeviceId
| where abs(datetime_diff('minute', Timestamp, AuthTimestamp)) < 5
| project Timestamp, DeviceName, InitiatingProcessFileName, UserPrincipalName, Location

Sigma — Sideloaded App with Surveillance Permissions

SIGMAtitle: Android Sideloaded App with Surveillance Permission Set
id: 9f2a4b7c-d8e1-4c5f-a3b6-1e7d9c4f8a52
status: experimental
description: |
    Detects Android app installation from non-Play Store sources with camera,
    microphone, SMS, location, and accessibility permissions simultaneously.
    This permission combination is the defining fingerprint of mobile spyware
    including ZeroDayRAT.
references:
    - https://intel.threadlinqs.com/#TL-2026-0116
    - https://iverify.io/blog/breaking-down-zerodayrat---new-spyware-targeting-android-and-ios
author: Threadlinqs Intelligence
date: 2026/02/22
tags:
    - attack.collection
    - attack.t1429
    - attack.t1512
    - attack.t1412
    - attack.t1430
    - attack.credential_access
    - attack.t1417.001
logsource:
    category: app_install
    product: android
detection:
    selection_source:
        install_source|not: 'com.android.vending'
    selection_perms:
        permissions|contains|all:
            - 'CAMERA'
            - 'RECORD_AUDIO'
            - 'READ_SMS'
            - 'ACCESS_FINE_LOCATION'
            - 'BIND_ACCESSIBILITY_SERVICE'
    condition: selection_source and selection_perms
falsepositives:
    - Parental control applications with broad permissions
    - Enterprise MDM/EMM agent applications
level: critical

Sigma — Banking Overlay Attack Detection

SIGMAtitle: Banking Overlay Attack - Screen Overlay Permission Abuse
id: 4d6e8f1a-b2c3-4a5d-9e7f-3c8b1d5a6e92
status: experimental
description: |
    Detects applications displaying overlays on banking and payment apps.
    ZeroDayRAT uses SYSTEM_ALERT_WINDOW to render fake login screens over
    PhonePe, Google Pay, PayPal, and banking applications.
references:
    - https://intel.threadlinqs.com/#TL-2026-0116
author: Threadlinqs Intelligence
date: 2026/02/22
tags:
    - attack.credential_access
    - attack.t1417.002
    - attack.collection
    - attack.t1513
logsource:
    category: app_activity
    product: android
detection:
    selection_overlay:
        event_type: 'overlay_displayed'
    selection_target:
        foreground_app|contains:
            - 'phonepe'
            - 'googlepay'
            - 'paytm'
            - 'paypal'
            - 'banking'
            - 'apple.mobilepayment'
    condition: selection_overlay and selection_target
falsepositives:
    - Chat bubble overlays displayed over banking apps
    - Accessibility-based autofill services
level: critical
Browse all 9 detection rules for this threat: View on Threadlinqs Intelligence
The Hacker News reporting on ZeroDayRAT mobile spyware enabling real-time camera/microphone surveillance, clipboard hijacking, and SMS OTP interception. The Hacker News reporting on ZeroDayRAT mobile spyware enabling real-time camera/microphone surveillance, clipboard hijacking, and SMS OTP interception.

Indicators of Compromise

Behavioral Indicators

ZeroDayRAT IOCs are primarily behavioral rather than hash-based, as the platform is actively updated and repackaged:
CategoryIndicatorContext
PermissionCamera + Mic + SMS + Location + Accessibility + Overlay combinedSpyware permission signature — extremely rare in legitimate apps
Background ActivityPersistent high-frequency outbound connections to non-CDN serversReal-time surveillance phone-home beacon
AccessibilityUnknown accessibility service enabled from sideloaded appKeylogging and overlay attack enabler
ClipboardCryptocurrency wallet addresses modified after copyClipboard hijacking for financial theft
Battery/DataUnexplained battery drain + elevated mobile data usageContinuous sensor access and data exfiltration
SMSNon-messaging app reading SMS contentOTP interception for 2FA bypass
OverlayUI overlay displayed on banking/payment applicationsCredential capture via fake login screen

Network Indicators

Specific C2 domains and IP addresses were not published in the iVerify analysis. Detection relies on behavioral patterns: persistent background connections pulling location, audio, and video data out to non-CDN infrastructure. The volume of data is noisy enough that network monitoring should catch it if you know what to look for.

Delivery Indicators

Timeline

DateEvent
2024-01-01Commercial spyware market established at government tier: Pegasus ($8M), Predator ($6M), Hermit
2025-01-01Google TAG, Citizen Lab, Amnesty Tech document 30+ commercial surveillance vendors
2026-02-02ZeroDayRAT first observed active on Telegram with sales and support channels
2026-02-16iVerify publishes technical breakdown with C2 dashboard screenshots
2026-02-16Cyber Security News, SecurityWeek, The Hacker News, Bleeping Computer amplify findings
2026-02-16iVerify confirms infected devices in India (Bengaluru) and the United States
2026-02-16Active development confirmed — developer maintains regular Telegram updates

MITRE ATT&CK Mapping (Mobile)

TacticTechniqueIDDescription
Initial AccessPhishingT1660Smishing with malicious APK/iOS download links
PersistenceForeground PersistenceT1541Background service maintaining C2 connection
Defense EvasionSuppress Application IconT1628.001Hidden from app drawer after installation
Defense EvasionMasqueradingT1655.001Disguised as legitimate utility application
Credential AccessInput Capture: KeyloggingT1417.001Full keystroke capture with app context
Credential AccessInput Capture: GUI Input CaptureT1417.002Banking overlay credential theft
CollectionLocation TrackingT1430GPS coordinates with full location history
CollectionAccess NotificationsT1517All app notifications intercepted
CollectionCapture SMS MessagesT1412Full SMS access including OTP interception
CollectionScreen CaptureT1513Live screen recording
CollectionCapture CameraT1512Front and rear camera streaming
CollectionAudio CaptureT1429Real-time microphone feed
CollectionProtected User Data: Contact ListT1636.003Complete contact extraction
ImpactClipboard ModificationT1510Crypto wallet address replacement
ImpactFinancial TheftT1657Banking overlay + crypto clipboard hijacking
Command and ControlWeb ServiceT1481Browser-based C2 panel
ExfiltrationExfiltration Over C2 ChannelT1646All collected data exfiltrated over C2
Full MITRE ATT&CK Mobile mapping: View coverage on Threadlinqs
TL-2026-0116 on Threadlinqs Intelligence — ZeroDayRAT commercial mobile spyware with Telegram-based C2 and cross-platform Android/iOS surveillance capabilities. TL-2026-0116 on Threadlinqs Intelligence — ZeroDayRAT commercial mobile spyware with Telegram-based C2 and cross-platform Android/iOS surveillance capabilities.

Recommendations

  1. Disable sideloading on all managed Android devices via MDM — Settings > Install unknown apps should be policy-enforced to off
  2. Replace SMS-based 2FA with TOTP authenticator apps or FIDO2 hardware keys — ZeroDayRAT intercepts SMS OTPs completely
  3. Deploy mobile threat detection (iVerify, Lookout, Zimperium) on managed and BYOD devices to detect spyware behavioral indicators
  4. Enable iOS Lockdown Mode on high-value targets — it blocks many attack vectors used by commercial spyware
  5. Verify cryptocurrency addresses manually before confirming transfers — clipboard hijacking silently replaces wallet addresses

References


Full threat intelligence, detection rules, and IOC feeds are available on Threadlinqs Intelligence. Track this threat: TL-2026-0116.