iSpy (Across Platforms)
Surveillance technology has grown by leaps and bounds in the last few decades. Mobile tracking like GPS, while necessary in emergencies, can be exploited easily. We do it to ourselves, even. How many of us ‘check-in’ at a location on social media? Want to know where your children are? There’s an app for that (there are several, in fact). And speaking of apps, data collection metrics are inherent in how they work. They track usage, shopping carts, names, addresses, financial data, on and on. As a society, we have become inured to the idea that our availability is perpetual and our privacy doesn’t matter in exchange for convenience. And this too falls under the exploitable category.
Mobile devices are notoriously insecure. Where a computer, be it laptop or desktop, comes with built in security software, like Windows Defender and XProtect and Gatekeeper on macOS, phones and tablets usually do not. And while there are numerous antiviral programs available to download, protections like Defender aren’t part of built-in mobile software, generally speaking. In essence, it’s up to the user to provide their own security, and be cautious when using their device. And threat actors know this.
Smishing, a phishing attack sent through text message, is the most common vector for infecting mobile platforms. Much like its email counterpart, a message is sent with a link to download something, or a redirect to a compromised website. It’s counting on the user not being able to hover over the link to see its actual source the way one can on a traditional setup. It’s also counting on people clicking a message from someone not in their contact list.
A couple of days ago, iVerify published a blog post regarding ZeroDayRAT, a spyware toolkit currently targeting Android and iOS users. It’s being openly sold on Telegram, and is organized as a suite of functions on a single dashboard, giving attackers full remote control over infected devices. Its developer maintains support for Android 5 through 16, and iOS up to 26, including the iPhone 17 Pro. Victim profiling is the first step, learning who they talk to, over both text and voice, how they use their apps, where they live and go, what accounts they hold. It intercepts messages, giving the operator the same information as the user with regards to banking, carriers and contacts alike.
But it does more than that. Passive data collection is bad enough, but this toolkit can also maintain live camera feeds and keylogging, meaning that it can see everything the user sees and access everything put in via the touchpad. Locations, screen and microphone recording. Biometric unlocks, gestures, keystrokes, app launches. This gives attackers all they need to hijack these controls. A crypto stealer scans for wallet apps, while a separate bank stealer module targets online banking apps, UPI platforms like PhonePe and Google Pay, and services like Apple Pay and PayPal. Between the two stealers, this captures the credentials of both and the threat actor can go after traditional financial accounts and cryptocurrency from the same panel.
This toolkit combines credential theft, account takeover, and data exfiltration into one platform. Previously this type of spyware has been seen only by nation-states backed by investment or bespoke exploit development. Now it’s in the hands of anyone who wants to buy it from Telegram, no further expertise required. And the danger isn’t just to individuals. How many people have a separate work phone that contains all the data and credentials for their employer?
iVerify states that detecting a threat like ZeroDayRAT requires deeper EDR beyond typical device management and that this type of protection should be as prioritized on mobile platforms as it is elsewhere. They’re right. But prevention is cheaper and simpler. In fact, it’s just one easy step. It always comes down to trust, or the deliberate lack of it in this case.
Don’t click that dodgy link!
Posted, 2/12/26