App usage is provided, including name and content: WhatsApp messages, Instagram notifications, missed calls, Telegram updates, YouTube alerts, system events… This goes deeper with details of registered accounts, providing Google, WhatsApp, Instagram, Facebook, Telegram, Amazon (and more) username and email – a complete and ready-made social engineering target source.All of this is passive collection from the victim’s device; but the kit also provides live surveillance including live camera streaming (front or back), screen recording, and a microphone feed. “Combined with GPS tracking, an operator can watch, listen to, and locate a target simultaneously,” writes iVerify.Mobile keylogger, crypto theftA keylogger captures every input: biometric unlocks, gestures, keystrokes, and app launches. The attacker is able to see what the victim is doing and what is being typed simultaneously.Capability also includes bank and crypto theft. There are few if any IoCs available. A shortened phone battery life is a flag, but not proof. Financial theft is probably the most visible flag.Live camera, screen recording, and microphone access from a single panel(Image Credit: iVerify)“The crypto stealer runs clipboard injection continuously, so theft happens whenever the victim tries to send funds. Unexplained outbound transactions to addresses victims don’t recognize would be a red flag,”explainsKelley.“The bank stealer goes after credentials rather than initiating transfers directly. There would be unauthorized logins. But by the time it shows up in financial records, the damage is done.”With most RATs, discovery of presence often triggers a malware wipe. It’s not yet clear if this is available for ZeroDayRAT. Kelley comments, “Remote wipe is pretty standard in commercial RATs. It would be unusual for something this full featured not to have it. We’d call it plausible but unconfirmed.”Takedown challengesiVerify describes ZeroDayRAT as a problem that isn’t going away. Firstly, it is almost impossible to detect the creator (for potential arrest). The toolkit is advertised in five languages: Portuguese, Russian, Chinese, Spanish, and English.“We’ve seen them post messages in Chinese, use a Russian domain, and target Indian victims,” says Kelley. “None of it lines up, and that looks intentional. We think they’re actively using disinformation to muddy attribution.”Similarly, there is no central server for authorities to locate and take down. “Every operator runs their own instance, so you’re playing whack-a-mole against individual infrastructures. The Telegram sales channel is the most visible chokepoint, but Telegram takedowns are slow, and even if it happens the developers just spin up a new channel.”This is a worrying new spyware RAT that may be with us for some time.Related:Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance SpywareRelated:Can ‘Lockdown Mode’ Solve Apple’s Mercenary Spyware Problem?Related:Apple Adds ‘Lockdown Mode’ to Thwart .Gov Mercenary SpywareRelated:Apple Adds ‘BlastDoor’ to Secure iPhones From Zero-Click Attacks

All of this is passive collection from the victim’s device; but the kit also provides live surveillance including live camera streaming (front or back), screen recording, and a microphone feed. “Combined with GPS tracking, an operator can watch, listen to, and locate a target simultaneously,” writes iVerify.Mobile keylogger, crypto theftA keylogger captures every input: biometric unlocks, gestures, keystrokes, and app launches. The attacker is able to see what the victim is doing and what is being typed simultaneously.Capability also includes bank and crypto theft. There are few if any IoCs available. A shortened phone battery life is a flag, but not proof. Financial theft is probably the most visible flag.Live camera, screen recording, and microphone access from a single panel(Image Credit: iVerify)“The crypto stealer runs clipboard injection continuously, so theft happens whenever the victim tries to send funds. Unexplained outbound transactions to addresses victims don’t recognize would be a red flag,”explainsKelley.“The bank stealer goes after credentials rather than initiating transfers directly. There would be unauthorized logins. But by the time it shows up in financial records, the damage is done.”With most RATs, discovery of presence often triggers a malware wipe. It’s not yet clear if this is available for ZeroDayRAT. Kelley comments, “Remote wipe is pretty standard in commercial RATs. It would be unusual for something this full featured not to have it. We’d call it plausible but unconfirmed.”Takedown challengesiVerify describes ZeroDayRAT as a problem that isn’t going away. Firstly, it is almost impossible to detect the creator (for potential arrest). The toolkit is advertised in five languages: Portuguese, Russian, Chinese, Spanish, and English.“We’ve seen them post messages in Chinese, use a Russian domain, and target Indian victims,” says Kelley. “None of it lines up, and that looks intentional. We think they’re actively using disinformation to muddy attribution.”Similarly, there is no central server for authorities to locate and take down. “Every operator runs their own instance, so you’re playing whack-a-mole against individual infrastructures. The Telegram sales channel is the most visible chokepoint, but Telegram takedowns are slow, and even if it happens the developers just spin up a new channel.”This is a worrying new spyware RAT that may be with us for some time.Related:Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance SpywareRelated:Can ‘Lockdown Mode’ Solve Apple’s Mercenary Spyware Problem?Related:Apple Adds ‘Lockdown Mode’ to Thwart .Gov Mercenary SpywareRelated:Apple Adds ‘BlastDoor’ to Secure iPhones From Zero-Click Attacks

A keylogger captures every input: biometric unlocks, gestures, keystrokes, and app launches. The attacker is able to see what the victim is doing and what is being typed simultaneously.Capability also includes bank and crypto theft. There are few if any IoCs available. A shortened phone battery life is a flag, but not proof. Financial theft is probably the most visible flag.Live camera, screen recording, and microphone access from a single panel(Image Credit: iVerify)“The crypto stealer runs clipboard injection continuously, so theft happens whenever the victim tries to send funds. Unexplained outbound transactions to addresses victims don’t recognize would be a red flag,”explainsKelley.“The bank stealer goes after credentials rather than initiating transfers directly. There would be unauthorized logins. But by the time it shows up in financial records, the damage is done.”With most RATs, discovery of presence often triggers a malware wipe. It’s not yet clear if this is available for ZeroDayRAT. Kelley comments, “Remote wipe is pretty standard in commercial RATs. It would be unusual for something this full featured not to have it. We’d call it plausible but unconfirmed.”Takedown challengesiVerify describes ZeroDayRAT as a problem that isn’t going away. Firstly, it is almost impossible to detect the creator (for potential arrest). The toolkit is advertised in five languages: Portuguese, Russian, Chinese, Spanish, and English.“We’ve seen them post messages in Chinese, use a Russian domain, and target Indian victims,” says Kelley. “None of it lines up, and that looks intentional. We think they’re actively using disinformation to muddy attribution.”Similarly, there is no central server for authorities to locate and take down. “Every operator runs their own instance, so you’re playing whack-a-mole against individual infrastructures. The Telegram sales channel is the most visible chokepoint, but Telegram takedowns are slow, and even if it happens the developers just spin up a new channel.”This is a worrying new spyware RAT that may be with us for some time.Related:Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance SpywareRelated:Can ‘Lockdown Mode’ Solve Apple’s Mercenary Spyware Problem?Related:Apple Adds ‘Lockdown Mode’ to Thwart .Gov Mercenary SpywareRelated:Apple Adds ‘BlastDoor’ to Secure iPhones From Zero-Click Attacks

Capability also includes bank and crypto theft. There are few if any IoCs available. A shortened phone battery life is a flag, but not proof. Financial theft is probably the most visible flag.Live camera, screen recording, and microphone access from a single panel(Image Credit: iVerify)“The crypto stealer runs clipboard injection continuously, so theft happens whenever the victim tries to send funds. Unexplained outbound transactions to addresses victims don’t recognize would be a red flag,”explainsKelley.“The bank stealer goes after credentials rather than initiating transfers directly. There would be unauthorized logins. But by the time it shows up in financial records, the damage is done.”With most RATs, discovery of presence often triggers a malware wipe. It’s not yet clear if this is available for ZeroDayRAT. Kelley comments, “Remote wipe is pretty standard in commercial RATs. It would be unusual for something this full featured not to have it. We’d call it plausible but unconfirmed.”Takedown challengesiVerify describes ZeroDayRAT as a problem that isn’t going away. Firstly, it is almost impossible to detect the creator (for potential arrest). The toolkit is advertised in five languages: Portuguese, Russian, Chinese, Spanish, and English.“We’ve seen them post messages in Chinese, use a Russian domain, and target Indian victims,” says Kelley. “None of it lines up, and that looks intentional. We think they’re actively using disinformation to muddy attribution.”Similarly, there is no central server for authorities to locate and take down. “Every operator runs their own instance, so you’re playing whack-a-mole against individual infrastructures. The Telegram sales channel is the most visible chokepoint, but Telegram takedowns are slow, and even if it happens the developers just spin up a new channel.”This is a worrying new spyware RAT that may be with us for some time.Related:Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance SpywareRelated:Can ‘Lockdown Mode’ Solve Apple’s Mercenary Spyware Problem?Related:Apple Adds ‘Lockdown Mode’ to Thwart .Gov Mercenary SpywareRelated:Apple Adds ‘BlastDoor’ to Secure iPhones From Zero-Click Attacks

“The crypto stealer runs clipboard injection continuously, so theft happens whenever the victim tries to send funds. Unexplained outbound transactions to addresses victims don’t recognize would be a red flag,”explainsKelley.“The bank stealer goes after credentials rather than initiating transfers directly. There would be unauthorized logins. But by the time it shows up in financial records, the damage is done.”With most RATs, discovery of presence often triggers a malware wipe. It’s not yet clear if this is available for ZeroDayRAT. Kelley comments, “Remote wipe is pretty standard in commercial RATs. It would be unusual for something this full featured not to have it. We’d call it plausible but unconfirmed.”Takedown challengesiVerify describes ZeroDayRAT as a problem that isn’t going away. Firstly, it is almost impossible to detect the creator (for potential arrest). The toolkit is advertised in five languages: Portuguese, Russian, Chinese, Spanish, and English.“We’ve seen them post messages in Chinese, use a Russian domain, and target Indian victims,” says Kelley. “None of it lines up, and that looks intentional. We think they’re actively using disinformation to muddy attribution.”Similarly, there is no central server for authorities to locate and take down. “Every operator runs their own instance, so you’re playing whack-a-mole against individual infrastructures. The Telegram sales channel is the most visible chokepoint, but Telegram takedowns are slow, and even if it happens the developers just spin up a new channel.”This is a worrying new spyware RAT that may be with us for some time.Related:Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance SpywareRelated:Can ‘Lockdown Mode’ Solve Apple’s Mercenary Spyware Problem?Related:Apple Adds ‘Lockdown Mode’ to Thwart .Gov Mercenary SpywareRelated:Apple Adds ‘BlastDoor’ to Secure iPhones From Zero-Click Attacks

“The bank stealer goes after credentials rather than initiating transfers directly. There would be unauthorized logins. But by the time it shows up in financial records, the damage is done.”With most RATs, discovery of presence often triggers a malware wipe. It’s not yet clear if this is available for ZeroDayRAT. Kelley comments, “Remote wipe is pretty standard in commercial RATs. It would be unusual for something this full featured not to have it. We’d call it plausible but unconfirmed.”Takedown challengesiVerify describes ZeroDayRAT as a problem that isn’t going away. Firstly, it is almost impossible to detect the creator (for potential arrest). The toolkit is advertised in five languages: Portuguese, Russian, Chinese, Spanish, and English.“We’ve seen them post messages in Chinese, use a Russian domain, and target Indian victims,” says Kelley. “None of it lines up, and that looks intentional. We think they’re actively using disinformation to muddy attribution.”Similarly, there is no central server for authorities to locate and take down. “Every operator runs their own instance, so you’re playing whack-a-mole against individual infrastructures. The Telegram sales channel is the most visible chokepoint, but Telegram takedowns are slow, and even if it happens the developers just spin up a new channel.”This is a worrying new spyware RAT that may be with us for some time.Related:Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance SpywareRelated:Can ‘Lockdown Mode’ Solve Apple’s Mercenary Spyware Problem?Related:Apple Adds ‘Lockdown Mode’ to Thwart .Gov Mercenary SpywareRelated:Apple Adds ‘BlastDoor’ to Secure iPhones From Zero-Click Attacks

With most RATs, discovery of presence often triggers a malware wipe. It’s not yet clear if this is available for ZeroDayRAT. Kelley comments, “Remote wipe is pretty standard in commercial RATs. It would be unusual for something this full featured not to have it. We’d call it plausible but unconfirmed.”Takedown challengesiVerify describes ZeroDayRAT as a problem that isn’t going away. Firstly, it is almost impossible to detect the creator (for potential arrest). The toolkit is advertised in five languages: Portuguese, Russian, Chinese, Spanish, and English.“We’ve seen them post messages in Chinese, use a Russian domain, and target Indian victims,” says Kelley. “None of it lines up, and that looks intentional. We think they’re actively using disinformation to muddy attribution.”Similarly, there is no central server for authorities to locate and take down. “Every operator runs their own instance, so you’re playing whack-a-mole against individual infrastructures. The Telegram sales channel is the most visible chokepoint, but Telegram takedowns are slow, and even if it happens the developers just spin up a new channel.”This is a worrying new spyware RAT that may be with us for some time.Related:Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance SpywareRelated:Can ‘Lockdown Mode’ Solve Apple’s Mercenary Spyware Problem?Related:Apple Adds ‘Lockdown Mode’ to Thwart .Gov Mercenary SpywareRelated:Apple Adds ‘BlastDoor’ to Secure iPhones From Zero-Click Attacks

iVerify describes ZeroDayRAT as a problem that isn’t going away. Firstly, it is almost impossible to detect the creator (for potential arrest). The toolkit is advertised in five languages: Portuguese, Russian, Chinese, Spanish, and English.“We’ve seen them post messages in Chinese, use a Russian domain, and target Indian victims,” says Kelley. “None of it lines up, and that looks intentional. We think they’re actively using disinformation to muddy attribution.”Similarly, there is no central server for authorities to locate and take down. “Every operator runs their own instance, so you’re playing whack-a-mole against individual infrastructures. The Telegram sales channel is the most visible chokepoint, but Telegram takedowns are slow, and even if it happens the developers just spin up a new channel.”This is a worrying new spyware RAT that may be with us for some time.Related:Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance SpywareRelated:Can ‘Lockdown Mode’ Solve Apple’s Mercenary Spyware Problem?Related:Apple Adds ‘Lockdown Mode’ to Thwart .Gov Mercenary SpywareRelated:Apple Adds ‘BlastDoor’ to Secure iPhones From Zero-Click Attacks

“We’ve seen them post messages in Chinese, use a Russian domain, and target Indian victims,” says Kelley. “None of it lines up, and that looks intentional. We think they’re actively using disinformation to muddy attribution.”Similarly, there is no central server for authorities to locate and take down. “Every operator runs their own instance, so you’re playing whack-a-mole against individual infrastructures. The Telegram sales channel is the most visible chokepoint, but Telegram takedowns are slow, and even if it happens the developers just spin up a new channel.”This is a worrying new spyware RAT that may be with us for some time.Related:Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance SpywareRelated:Can ‘Lockdown Mode’ Solve Apple’s Mercenary Spyware Problem?Related:Apple Adds ‘Lockdown Mode’ to Thwart .Gov Mercenary SpywareRelated:Apple Adds ‘BlastDoor’ to Secure iPhones From Zero-Click Attacks

Similarly, there is no central server for authorities to locate and take down. “Every operator runs their own instance, so you’re playing whack-a-mole against individual infrastructures. The Telegram sales channel is the most visible chokepoint, but Telegram takedowns are slow, and even if it happens the developers just spin up a new channel.”This is a worrying new spyware RAT that may be with us for some time.Related:Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance SpywareRelated:Can ‘Lockdown Mode’ Solve Apple’s Mercenary Spyware Problem?Related:Apple Adds ‘Lockdown Mode’ to Thwart .Gov Mercenary SpywareRelated:Apple Adds ‘BlastDoor’ to Secure iPhones From Zero-Click Attacks

Source: SecurityWeek