New reporting has identified “ZeroDayRAT” as a mobile spyware tool that allegedly targets both Android and iOS and gives attackers persistent access to compromised devices. Public technical details remain limited, however, and there is not yet a widely cited independent analysis tying the malware to a specific threat actor, exploit chain, or victim set.
According to Infosecurity Magazine, ZeroDayRAT is being positioned as a cross-platform remote access tool for mobile surveillance. That matters because true Android and iOS coverage usually requires separate payloads, distinct infection methods, or a broader spyware framework rather than a single universal implant. So far, no public CVEs, indicators of compromise, or vendor advisories appear to be linked to the name.
The “zero-day” branding also remains unverified. At this stage, there is no public evidence confirming that the spyware relies on previously unknown vulnerabilities. The name may reflect marketing language rather than a documented zero-day exploit chain. Until researchers publish technical samples or forensic findings, it is unclear whether ZeroDayRAT is a newly discovered malware family, a commercial surveillance product, or a rebranded mobile RAT.
If the reported capabilities hold up, the impact could be significant. Persistent mobile access can expose messages, calls, location data, stored files, authentication codes, and business communications. For enterprises, an infected phone can become an entry point to email, collaboration platforms, and other internal systems. For individuals, especially journalists, activists, executives, and government staff, the privacy risks are obvious.
The report also fits a broader pattern: mobile spyware remains attractive because smartphones hold both personal and corporate data, yet often receive less security monitoring than laptops. Defenders should treat cross-platform mobile surveillance claims seriously, even when technical proof is still emerging. Basic protections still help: keep devices updated, avoid sideloading apps or installing unknown profiles, review app permissions carefully, and use a trusted VPN on untrusted networks.
For now, the main takeaway is caution. ZeroDayRAT has entered public reporting as a potentially capable mobile spyware tool, but many of the details that would confirm its sophistication and real-world use are still missing.




