ZeroDayRAT Malware Targets Android and iOS Devices
Summary
Hide ▲
Show ▼
A new commercial spyware platform, ZeroDayRAT, is being advertised on Telegram, offering full remote control over compromised Android (versions 5–16) and iOS (up to version 26) devices. The malware provides extensive surveillance capabilities, including real-time tracking, data theft, and financial fraud. It can log app usage, SMS messages, and notifications, activate cameras and microphones, and steal cryptocurrency and banking credentials. ZeroDayRAT is marketed through Telegram channels and infections are initiated by persuading victims to install malicious binaries via smishing, phishing emails, counterfeit app stores, and links shared through WhatsApp or Telegram. The malware includes a dedicated web-based dashboard displaying device details, app usage, SMS messages, and live activity timeline. It also includes a crypto stealer and targets online banking apps, UPI platforms, and payment services like Apple Pay and PayPal. The malware is sold openly on Telegram with access to a panel featuring sales, customer support, and platform updates channels. ZeroDayRAT support spans Android 5 through 16 and iOS up to 26, and it provides a complete overview of the phone's makeup, including device model, SIM, location data, carrier info, live activity timeline, and recent SMS messages. The malware includes features such as SMS control, keylogger, microphone feed, screen recorder, bank stealer, and crypto stealer. ZeroDayRAT is priced at $2,000, indicating higher-than-average ambitions and targeting specific individuals or enterprises. The malware represents a convergence of nation-state-level capabilities with criminal economics, widening the target market for surveillance malware.
Timeline
-
10.02.2026 15:00 4 articles · 6d ago
ZeroDayRAT Malware Advertised on Telegram
ZeroDayRAT is marketed through Telegram channels. Infections are initiated by persuading victims to install malicious binaries via smishing, phishing emails, counterfeit app stores, and links shared through WhatsApp or Telegram. The malware provides a dedicated web-based dashboard displaying device model, OS version, battery status, SIM details, country, lock state, app usage, SMS messages, and live activity timeline. It includes a crypto stealer that detects wallets and injects attacker-controlled clipboard addresses, and targets online banking apps, UPI platforms such as PhonePe and Google Pay, and services including Apple Pay and PayPal via overlay attacks. ZeroDayRAT is sold openly on Telegram with access to a panel featuring sales, customer support, and platform updates channels. ZeroDayRAT support spans Android 5 through 16 and iOS up to 26, and it provides a complete overview of the phone's makeup, including device model, SIM, location data, carrier info, live activity timeline, and recent SMS messages. The malware includes features such as SMS control, keylogger, microphone feed, screen recorder, bank stealer, and crypto stealer. ZeroDayRAT is priced at $2,000, indicating higher-than-average ambitions and targeting specific individuals or enterprises. The malware represents a convergence of nation-state-level capabilities with criminal economics, widening the target market for surveillance malware. The developer runs dedicated Telegram channels for sales, customer support, and regular updates. The malware's panel enumerates all accounts on the device and extracts GPS coordinates, plotting them on Google Maps. The malware's stealer component targets wallet apps and substitutes clipboard addresses to reroute transactions.
Show sources
- ZeroDayRAT malware grants full access to Android, iOS devices — www.bleepingcomputer.com — 10.02.2026 15:00
- New Mobile Spyware ZeroDayRAT Targets Android and iOS — www.infosecurity-magazine.com — 10.02.2026 16:00
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
Information Snippets
-
ZeroDayRAT is advertised on Telegram as a tool for full remote control over Android and iOS devices.
First reported: 10.02.2026 15:004 sources, 4 articlesShow sources
- ZeroDayRAT malware grants full access to Android, iOS devices — www.bleepingcomputer.com — 10.02.2026 15:00
- New Mobile Spyware ZeroDayRAT Targets Android and iOS — www.infosecurity-magazine.com — 10.02.2026 16:00
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
The malware supports Android versions 5 through 16 and iOS up to version 26.
First reported: 10.02.2026 15:004 sources, 4 articlesShow sources
- ZeroDayRAT malware grants full access to Android, iOS devices — www.bleepingcomputer.com — 10.02.2026 15:00
- New Mobile Spyware ZeroDayRAT Targets Android and iOS — www.infosecurity-magazine.com — 10.02.2026 16:00
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT provides a dashboard displaying device model, OS version, battery status, SIM details, country, and lock state.
First reported: 10.02.2026 15:003 sources, 3 articlesShow sources
- ZeroDayRAT malware grants full access to Android, iOS devices — www.bleepingcomputer.com — 10.02.2026 15:00
- New Mobile Spyware ZeroDayRAT Targets Android and iOS — www.infosecurity-magazine.com — 10.02.2026 16:00
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
The malware logs app usage, SMS messages, and notifications, and can track the victim's location in real-time.
First reported: 10.02.2026 15:004 sources, 4 articlesShow sources
- ZeroDayRAT malware grants full access to Android, iOS devices — www.bleepingcomputer.com — 10.02.2026 15:00
- New Mobile Spyware ZeroDayRAT Targets Android and iOS — www.infosecurity-magazine.com — 10.02.2026 16:00
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT can activate cameras and microphones, record the screen, and capture one-time passwords (OTPs) for 2FA bypass.
First reported: 10.02.2026 15:004 sources, 4 articlesShow sources
- ZeroDayRAT malware grants full access to Android, iOS devices — www.bleepingcomputer.com — 10.02.2026 15:00
- New Mobile Spyware ZeroDayRAT Targets Android and iOS — www.infosecurity-magazine.com — 10.02.2026 16:00
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
The malware includes a keylogging module to capture user input such as passwords and screen unlock patterns.
First reported: 10.02.2026 15:004 sources, 4 articlesShow sources
- ZeroDayRAT malware grants full access to Android, iOS devices — www.bleepingcomputer.com — 10.02.2026 15:00
- New Mobile Spyware ZeroDayRAT Targets Android and iOS — www.infosecurity-magazine.com — 10.02.2026 16:00
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT has a cryptocurrency stealer module targeting MetaMask, Trust Wallet, Binance, and Coinbase.
First reported: 10.02.2026 15:004 sources, 4 articlesShow sources
- ZeroDayRAT malware grants full access to Android, iOS devices — www.bleepingcomputer.com — 10.02.2026 15:00
- New Mobile Spyware ZeroDayRAT Targets Android and iOS — www.infosecurity-magazine.com — 10.02.2026 16:00
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
The malware targets online banking apps, UPI platforms, and payment services like Apple Pay and PayPal.
First reported: 10.02.2026 15:004 sources, 4 articlesShow sources
- ZeroDayRAT malware grants full access to Android, iOS devices — www.bleepingcomputer.com — 10.02.2026 15:00
- New Mobile Spyware ZeroDayRAT Targets Android and iOS — www.infosecurity-magazine.com — 10.02.2026 16:00
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
iVerify researchers warn that a compromised employee device could lead to enterprise breaches.
First reported: 10.02.2026 15:004 sources, 4 articlesShow sources
- ZeroDayRAT malware grants full access to Android, iOS devices — www.bleepingcomputer.com — 10.02.2026 15:00
- New Mobile Spyware ZeroDayRAT Targets Android and iOS — www.infosecurity-magazine.com — 10.02.2026 16:00
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
Users are advised to trust only official app stores and consider enabling Lockdown Mode on iOS and Advanced Protection on Android.
First reported: 10.02.2026 15:001 source, 1 articleShow sources
- ZeroDayRAT malware grants full access to Android, iOS devices — www.bleepingcomputer.com — 10.02.2026 15:00
-
ZeroDayRAT is marketed through Telegram channels.
First reported: 10.02.2026 16:003 sources, 3 articlesShow sources
- New Mobile Spyware ZeroDayRAT Targets Android and iOS — www.infosecurity-magazine.com — 10.02.2026 16:00
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT infections are initiated by persuading victims to install malicious binaries via smishing, phishing emails, counterfeit app stores, and links shared through WhatsApp or Telegram.
First reported: 10.02.2026 16:003 sources, 3 articlesShow sources
- New Mobile Spyware ZeroDayRAT Targets Android and iOS — www.infosecurity-magazine.com — 10.02.2026 16:00
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT provides a dedicated web-based dashboard displaying device model, OS version, battery status, SIM details, country, lock state, app usage, SMS messages, and live activity timeline.
First reported: 10.02.2026 16:003 sources, 3 articlesShow sources
- New Mobile Spyware ZeroDayRAT Targets Android and iOS — www.infosecurity-magazine.com — 10.02.2026 16:00
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT includes a crypto stealer that detects wallets and injects attacker-controlled clipboard addresses.
First reported: 10.02.2026 16:003 sources, 3 articlesShow sources
- New Mobile Spyware ZeroDayRAT Targets Android and iOS — www.infosecurity-magazine.com — 10.02.2026 16:00
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT targets online banking apps, UPI platforms such as PhonePe and Google Pay, and services including Apple Pay and PayPal via overlay attacks.
First reported: 10.02.2026 16:003 sources, 3 articlesShow sources
- New Mobile Spyware ZeroDayRAT Targets Android and iOS — www.infosecurity-magazine.com — 10.02.2026 16:00
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT is sold openly on Telegram with access to a panel featuring sales, customer support, and platform updates channels.
First reported: 10.02.2026 23:372 sources, 2 articlesShow sources
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT support spans Android 5 through 16 and iOS up to 26.
First reported: 10.02.2026 23:372 sources, 2 articlesShow sources
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT provides a complete overview of the phone's makeup, including device model, SIM, location data, carrier info, live activity timeline, and recent SMS messages.
First reported: 10.02.2026 23:372 sources, 2 articlesShow sources
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT can build a complete profile of the victim, enabling account takeover or targeted social engineering.
First reported: 10.02.2026 23:372 sources, 2 articlesShow sources
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT includes features such as SMS control, keylogger, microphone feed, screen recorder, bank stealer, and crypto stealer.
First reported: 10.02.2026 23:372 sources, 2 articlesShow sources
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT is priced at $2,000, indicating higher-than-average ambitions and targeting specific individuals or enterprises.
First reported: 10.02.2026 23:372 sources, 2 articlesShow sources
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT represents a convergence of nation-state-level capabilities with criminal economics, widening the target market for surveillance malware.
First reported: 10.02.2026 23:372 sources, 2 articlesShow sources
- In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' — www.darkreading.com — 10.02.2026 23:37
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT's developer runs dedicated Telegram channels for sales, customer support, and regular updates.
First reported: 16.02.2026 12:241 source, 1 articleShow sources
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT's builder generates malicious binaries provided to buyers along with an online panel for self-hosted setup.
First reported: 16.02.2026 12:241 source, 1 articleShow sources
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT's panel enumerates all accounts registered on the device, including Google, WhatsApp, Instagram, Facebook, Telegram, Amazon, Flipkart, PhonePe, Paytm, and Spotify.
First reported: 16.02.2026 12:241 source, 1 articleShow sources
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT's panel extracts current GPS coordinates and plots them on Google Maps, along with location history.
First reported: 16.02.2026 12:241 source, 1 articleShow sources
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT's bank stealer module targets mobile wallet platforms like Apple Pay, Google Pay, PayPal, and PhonePe.
First reported: 16.02.2026 12:241 source, 1 articleShow sources
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT's malware is distributed via social engineering or fake app marketplaces.
First reported: 16.02.2026 12:241 source, 1 articleShow sources
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT's malware incorporates a stealer component that scans for wallet apps like MetaMask, Trust Wallet, Binance, and Coinbase.
First reported: 16.02.2026 12:241 source, 1 articleShow sources
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
-
ZeroDayRAT's malware substitutes wallet addresses copied to the clipboard to reroute transactions to a wallet under the attacker's control.
First reported: 16.02.2026 12:241 source, 1 articleShow sources
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft — thehackernews.com — 16.02.2026 12:24
Similar Happenings
Android Malware Campaign Abuses Hugging Face Platform
A new Android malware campaign leverages the Hugging Face platform to distribute thousands of variants of an APK payload designed to steal credentials from popular financial and payment services. The attack begins with a dropper app called TrustBastion, which uses scareware-style ads to lure victims into installing it. The malware then redirects to a Hugging Face repository to download the final payload, using server-side polymorphism to evade detection. The malware exploits Android’s Accessibility Services to capture screenshots, monitor user activity, and steal credentials. The campaign was discovered by Bitdefender researchers, who found over 6,000 commits in the repository. The repository was taken down but resurfaced under a new name, 'Premium Club,' with the same malicious code. Bitdefender has published indicators of compromise and informed Hugging Face, which removed the malicious datasets. The infection chain begins when users download the malicious Android app TrustBastion, which appears as scareware via popups claiming the device is infected with malware. The dropper app prompts users to run an update that mimics legitimate Google Play and Android system update dialog boxes. The dropper contacts an encrypted endpoint hosted at trustbastion[.]com, which returns an HTML file containing a redirect link to the Hugging Face repository hosting the malware. The malware masquerades as a 'Phone Security' feature to guide users through enabling Accessibility Services. The malware requests permissions for screen recording, screen casting, and overlay display to monitor all user activity and capture screen content. The malware captures lockscreen information for security verification of financial and payment services.
Sturnus Android Malware Targets Encrypted Messaging Apps and Banking Credentials
Sturnus, a new Android banking trojan, steals messages from encrypted apps like Signal, WhatsApp, and Telegram by capturing screen content post-decryption. It performs full device takeover via VNC and overlays to steal banking credentials. The malware is under development but fully functional, targeting European financial institutions with region-specific overlays. It uses a mix of encryption methods for C2 communication and abuses Accessibility services for extensive control. The malware is disguised as legitimate apps like Google Chrome or Preemix Box, but distribution methods remain unknown. It establishes encrypted channels for commands and data exfiltration, and gains Device Administrator privileges to prevent removal. ThreatFabric reports low-volume attacks in Southern and Central Europe, suggesting testing for larger campaigns. New details reveal Sturnus uses WebSocket and HTTP channels for communication, displays full-screen overlays mimicking OS updates, and collects extensive device data for continuous feedback.
NFC Relay Malware Surge Targeting European Payment Cards
A surge of NFC relay malware targeting payment cards has been observed in Eastern Europe. Over 760 malicious Android apps have been identified, exploiting Host Card Emulation (HCE) to steal contactless credit card data. The malware captures EMV fields, manipulates APDU commands, and enables unauthorized payments. The malware has evolved into multiple variants, including data harvesters, relay toolkits, and ghost-tap payments. It has spread across Poland, the Czech Republic, Russia, and Slovakia. The apps impersonate Google Pay and various financial institutions, with over 70 command-and-control servers and Telegram bots facilitating the attacks. New research reveals over 54 malicious APK samples, often disguised as legitimate financial apps, are being sold and promoted within Chinese-language cybercrime communities on Telegram. Victims are targeted through smishing and vishing campaigns, and card data is transmitted via C2 servers to complete fraudulent transactions. Prominent vendors like TX-NFC, X-NFC, and NFU Pay sell access to this malware, with TX-NFC alone having over 21,000 subscribers.
ClayRat Spyware Campaign Targets Android Users in Russia
A rapidly evolving Android spyware campaign known as ClayRat continues to target Russian users through Telegram channels and phishing websites. The spyware disguises itself as trusted apps such as WhatsApp, TikTok, Google Photos, and YouTube to trick users into downloading malicious software. Over the past three months, researchers identified more than 700 distinct ClayRat samples and 50 droppers, each version introducing new obfuscation layers to evade security tools. Once installed, the spyware can exfiltrate call logs, SMS messages, and notifications, take photos using the front camera, and send messages or place calls directly from the victim’s phone. The spyware’s operators employ a multifaceted strategy combining impersonation, deception, and automation. Distribution occurs mainly through phishing sites, Telegram channels, step-by-step installation guides, and session-based installers posing as Play Store updates. ClayRat’s most concerning feature is its abuse of Android's default SMS handler role, allowing it to read, store, and send text messages without alerting users. This access is exploited to spread itself further, sending messages to every saved contact. The latest version of ClayRat introduces far broader capabilities by combining Default SMS privileges with extensive abuse of Accessibility Services. Key functions include a keylogger that captures PINs, passwords, and patterns, full screen recording through the MediaProjection API, overlays that disguise malicious activity, and automated taps designed to block users from shutting down the device or deleting the app. These enhancements make the malware more persistent than earlier versions. A new Android remote access trojan (RAT) called Fantasy Hub has been disclosed, sold as a Malware-as-a-Service (MaaS) product on Russian-speaking Telegram channels. Fantasy Hub enables device control and espionage, allowing threat actors to collect SMS messages, contacts, call logs, images, and videos. The malware abuses the default SMS privileges to obtain access to SMS messages, contacts, camera, and files, and uses fake overlays to obtain banking credentials associated with Russian financial institutions. Fantasy Hub is available for $200 per week, $500 per month, or $4,500 per year, and its C2 panel provides details about compromised devices and subscription status. Zimperium's systems detected ClayRat variants as soon as they appeared, before public disclosures. The company shared its findings with Google, helping ensure protection through Google Play Protect. Security experts recommend a layered mobile security posture to reduce installation paths, detect compromise, and limit the blast radius. Users should only install applications from authorized Play/App stores.
ToSpy and ProSpy spyware targeting UAE users
Two spyware families, ToSpy and ProSpy, are targeting Android users in the UAE by masquerading as the ToTok app and Signal encryption plugins. These campaigns have been active since 2022 and 2024, respectively, and exploit the popularity and local trust of ToTok to infiltrate devices and exfiltrate sensitive data. ToTok, a messaging app developed by G42 and supported by the UAE government, was exposed as spyware in 2019 and removed from major app stores. Despite this, it continues to circulate outside official channels, providing cover for malicious actors. The spyware families request invasive permissions to steal device information, contacts, SMS messages, and various file types. Google Play Protect is designed to mitigate these threats, but users are still at risk if they download apps from untrusted sources. The spyware campaigns are distributed via fake websites and social engineering, establishing persistent access to compromised devices. The ProSpy campaign was discovered in June 2025 and has been ongoing since 2024, while the ToSpy campaign began on June 30, 2022, and is currently ongoing. The spyware families use deceptive websites masquerading as legitimate services to distribute malware. The spyware families exfiltrate device information, SMS messages, contact lists, files, and a list of installed applications. The spyware families use Android's AlarmManager to repeatedly restart the foreground service if it gets terminated. The spyware families automatically launch the necessary background services upon a device reboot.