TL;DR
A new malware-as-a-service called ZeroDayRAT claims comprehensive surveillance capabilities on Android and iOS devices. Security researcher Troy Hunt highlights ongoing issues with breach notification delays affecting victims.
ZeroDayRAT represents a new malware-as-a-service threat targeting mobile devices with comprehensive surveillance capabilities, warranting medium severity despite no confirmed widespread deployment.
Cybercriminals have begun advertising ZeroDayRAT, a new malware-as-a-service (MaaS) targeting both Android and iOS devices through Telegram channels. According to Hackread's analysis, the malware claims comprehensive surveillance capabilities including:
The malware's distribution via Telegram as a service model lowers the barrier to entry for threat actors lacking technical expertise. While the actual capabilities and deployment scale remain unverified, the emergence of cross-platform mobile surveillance tools represents a concerning evolution in consumer device targeting.
Security researcher Troy Hunt identified a recurring pattern in his Weekly Update 492: significant delays between data breaches occurring and victims receiving notification. Hunt's analysis points to the complex operational reality facing breached organizations, which must simultaneously manage:
These competing priorities often result in extended timelines before individual victims learn their data has been compromised, leaving them unable to take protective measures during critical windows.
Hackread's overview of the 2026 data breach landscape highlights the integration of artificial intelligence into attack methodologies. Key developments include:
The analysis suggests that while attack techniques continue advancing, fundamental security principles and breach causes remain largely consistent with previous years.