Description

Security researchers have identified a new cross-platform remote access trojan (RAT), dubbed ZeroDayRAT, actively targeting both Android and iOS devices. The malware is designed to conduct stealthy surveillance and data exfiltration, enabling attackers to gain persistent control over compromised mobile devices. Unlike conventional mobile malware that focuses on a single operating system, ZeroDayRAT demonstrates multi-platform capability, increasing its operational reach and threat potential across consumer and enterprise environments. ZeroDayRAT is distributed through social engineering campaigns that trick users into installing malicious applications disguised as legitimate software. On Android, the malware is typically delivered via sideloaded APK files, while iOS infections may involve deceptive configuration profiles or enterprise-signed applications. Once installed, the malware establishes communication with a command-and-control (C2) server to receive instructions and transmit stolen data. The RAT supports capabilities such as SMS interception, call log access, contact harvesting, file extraction, and device tracking. It may also request high-risk permissions to maintain persistence and evade removal. By leveraging encrypted C2 channels and modular payloads, the malware can dynamically update its functionality. Its cross-platform design indicates a coordinated campaign aimed at long-term espionage and intelligence gathering rather than opportunistic cybercrime.