{"id":98,"date":"2026-02-27T14:52:23","date_gmt":"2026-02-27T14:52:23","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=98"},"modified":"2026-02-27T14:52:23","modified_gmt":"2026-02-27T14:52:23","slug":"promptspy-android-malware-abuses-gemini-ai-to-automate-recent-apps-persistence","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=98","title":{"rendered":"PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence"},"content":{"rendered":"<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEidDhkNjYF9Khe4u-ECtSVv3ezo7dUK80WV06lgCNtOdV51GuCKCMmxgdm10lbAhP7MRPVY7Pq5yMuiYPAJ0Opk2xPijnkjHOWfPqiD9oR6k56GqDX6l5IgjYa_9ZTnvxvN6KnazUB0LBZ3aZMOnVrtoodDr-Hx_JTTNjMyzm-u1alcCL6VXeqoeTl12jFE\/s1700-e365\/android-ai.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Cybersecurity researchers have discovered what they say is the first Android malware that abuses Gemini, Google&#8217;s generative artificial intelligence (AI) chatbot, as part of its execution flow and achieves persistence.<\/p>\n<p>The malware has been codenamed <strong>PromptSpy<\/strong> by ESET. The malware is equipped to capture lockscreen data, block uninstallation efforts, gather device information, take screenshots, and record screen activity as video.<\/p>\n<p>\u00abGemini is used to analyze the current screen and provide PromptSpy with step-by-step instructions on how to ensure the malicious app remains pinned in the recent apps list, thus preventing it from being easily swiped away or killed by the system,\u00bb ESET researcher Luk\u00e1\u0161 \u0160tefanko <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/promptspy-ushers-in-era-android-threats-using-genai\/\" rel=\"noopener\" target=\"_blank\">said<\/a> in a report published today.<\/p>\n<p>\u00abSince Android malware often relies on UI navigation, leveraging generative AI enables the threat actors to adapt to more or less any device, layout, or OS version, which can greatly expand the pool of potential victims.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/sse-customer-awards-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5Ij_-TeqFMEsRFzgRRFzSRlVK6oHCncN_eJ2fkOdsA_1tN9HQbAlEEife2Z2JUt1lPv4st5n9KZP84jGEYY9Up6BQ7QE-N5rs6OhzL5thxGzVxnMx3JH9cGRLi9S5Kl-iV5PgjBeTdkBLnv_inF8UUAo88iqdmgJuPIc_6qiPyUMXwFyZWbZvkZkcRXSw\/s728-e100\/gartner-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Specifically, this involves hard-coding the AI model and a prompt in the malware, assigning the AI agent the persona of an \u00abAndroid automation assistant.\u00bb It sends Gemini a natural language prompt along with an XML dump of the current screen that gives detailed information about every UI element, including its text, type, and exact position on the display.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>Gemini then processes this information and responds with JSON instructions that tell the malware what action to perform (e.g., a tap) and where to perform it. The multi-step interaction continues until the app is successfully locked in the recent apps list and cannot be terminated.<\/p>\n<p>The main goal of PromptSpy is to deploy a built-in VNC module that grants the attackers remote access to the victim&#8217;s device. The malware is also designed to take advantage of Android&#8217;s accessibility services to prevent it from being uninstalled using invisible overlays. It communicates with a hard-coded command-and-control (C2) server (\u00ab54.67.2[.]84\u00bb) via the VNC protocol.<\/p>\n<p>It&#8217;s worth noting that the actions suggested by Gemini are executed through accessibility services, allowing the malware to interact with the device without user input. All of this is accomplished by communicating with the C2 server to receive the Gemini API key, take screenshots on demand, intercept lockscreen PIN or password, record screen, and capture the pattern unlock screen as a video.\u00a0<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj924Dw3s39lTJUfiEwcbpM2l-v0mmLu08hiM964q-IaP5dTyFK0XhV9e5_s9Y2HHMVQut-vfXp2LskG_Mxf_3cI1YndvxC7RaeyeUvNQFUhpnYJTPX52gSlIleR-7r69zwL3qucBpdRZygBZGekIRkjdtHCxOfvkW_T04ew6s7oP4JqTHWaoWLJtU7cVlh\/s1700-e365\/code.png\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj924Dw3s39lTJUfiEwcbpM2l-v0mmLu08hiM964q-IaP5dTyFK0XhV9e5_s9Y2HHMVQut-vfXp2LskG_Mxf_3cI1YndvxC7RaeyeUvNQFUhpnYJTPX52gSlIleR-7r69zwL3qucBpdRZygBZGekIRkjdtHCxOfvkW_T04ew6s7oP4JqTHWaoWLJtU7cVlh\/s1700-e365\/code.png\" alt=\"\" border=\"0\" data-original-height=\"747\" data-original-width=\"981\"\/><\/a><\/div>\n<p>An analysis of the language localization clues and the distribution vectors used suggests that the campaign is likely financially motivated and targets users in Argentina. Interestingly, evidence shows that PromptSpy was developed in a Chinese\u2011speaking environment, as indicated by the presence of debug strings written in simplified Chinese.<\/p>\n<p>\u00abPromptSpy is distributed by a dedicated website and has never been available on Google Play,\u00bb \u0160tefanko said.<\/p>\n<p>PromptSpy is assessed to be an advanced version of another previously unknown Android malware called VNCSpy, samples of which were first uploaded to the VirusTotal platform last month from Hong Kong.<\/p>\n<p>The website, \u00abmgardownload[.]com,\u00bb is used to deliver a dropper, which, when installed and launched, opens a web page hosted on \u00abm-mgarg[.]com.\u00bb It masquerades as JPMorgan Chase, going by the name \u00abMorganArg\u00bb in reference to Morgan Argentina. The dropper also instructs victims to grant it permissions to install apps from unknown sources to deploy PromptSpy.\u00a0<\/p>\n<p>\u00abIn the background, the Trojan contacts its server to request a configuration file, which includes a link to download another APK, presented to the victim, in Spanish, as an update,\u00bb ESET said. \u00abDuring our research, the configuration server was no longer accessible, so the exact download URL remains unknown.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ztw-hands-on-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhC66R4wPZ8qksTJukqlCCmrHCUX65DnpWW1nKnkOhy0Poe219tacbU6h09qEfUgRHxoObBazf3SVJ4OAd_iVd0EFecj-vskZSfroQ7rh0XyxQd6Ep_zNgqDW95YU4zG1Gpin8rHPK8Rqu_1KV7tf-G-7JJhxOVHhRJDWnj0qfq82uZSAvAG2rxK-Fe5fwd\/s728-e100\/ThreatLocker-d.png\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The findings illustrate how threat actors are incorporating AI tools into their operations and make malware more dynamic, giving them ways to automate actions that would otherwise be more challenging with conventional approaches.<\/p>\n<p>Because PromptSpy prevents itself from being uninstalled by overlaying invisible elements on the screen, the only way for a victim to remove it is to <a href=\"https:\/\/support.google.com\/android\/answer\/7665064?hl=en\" rel=\"noopener\" target=\"_blank\">reboot the device into Safe Mode<\/a>, where third\u2011party apps are disabled and can be uninstalled.<\/p>\n<p>\u00abPromptSpy shows that Android malware is beginning to evolve in a sinister way,\u00bb ESET said. \u00abBy relying on generative AI to interpret on\u2011screen elements and decide how to interact with them, the malware can adapt to virtually any device, screen size, or UI layout it encounters.\u00bb<\/p>\n<p>\u00abInstead of hardcoded taps, it simply hands AI a snapshot of the screen and receives precise, step\u2011by\u2011step interaction instructions in return, helping it achieve a persistence technique resistant to UI changes.\u00bb<\/p>\n<p>When reached for comment, a Google spokesperson told The Hacker News via email that there is currently no evidence that apps containing PromptSpy are being distributed via Google Play.<\/p>\n<p>\u00abAndroid users are automatically protected against known versions of this malware by <a href=\"https:\/\/support.google.com\/googleplay\/answer\/2812853?hl=en\" rel=\"noopener\" target=\"_blank\">Google Play Protect<\/a>, which is on by default on Android devices with Google Play Services. Google Play Protect can warn users or block apps known to exhibit malicious behavior, even when those apps come from sources outside of Play,\u00bb the spokesperson added.<\/p>\n<p><em>(The story was updated after publication to include a response from Google.)<\/em>\u00a0<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers have discovered what they say is the first Android malware that abuses Gemini, Google&#8217;s generative artificial intelligence (AI) chatbot, as part of its execution flow and achieves persistence.&hellip;<\/p>\n","protected":false},"author":1,"featured_media":99,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[226,281,283,282,42,285,133,284],"class_list":["post-98","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-abuses","tag-android","tag-automate","tag-gemini","tag-malware","tag-persistence","tag-promptspy","tag-recentapps"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/98","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=98"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/98\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/99"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=98"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=98"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=98"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}