PromptSpy Android Malware Exploits Gemini AI to Maintain Persistence on Infected Devices

3 Sources

Share

Cybersecurity researchers at ESET discovered PromptSpy, the first Android malware utilizing generative AI in its execution flow. The malware connects to Google's Gemini chatbot to interpret device interfaces and maintain persistence, preventing easy removal. Targeting users in Argentina through phishing sites impersonating JPMorgan Chase, PromptSpy deploys a VNC module for remote control while blocking uninstallation attempts.

First Android Malware Utilizing Generative AI Emerges

Cybersecurity researchers at ESET have uncovered PromptSpy, marking the first documented instance of Android malware that integrates Gemini AI into its operational framework

1

. The malware utilizes Google's generative AI chatbot to analyze user interface elements and execute sophisticated persistence techniques on infected devices. According to ESET researcher Lukas Stefanko, this represents a significant evolution in mobile threat capabilities, as the malware can adapt to virtually any device configuration

2

.

Source: Hacker News

Source: Hacker News

The PromptSpy malware sends predefined prompts to Gemini's API along with an XML dump of the current screen, providing detailed information about every UI element including text, type, and exact position

3

. Gemini processes this data and returns JSON instructions specifying what action to perform and where to execute it. This multi-step interaction continues until the malicious app successfully remains pinned in the recent apps list, preventing it from being easily swiped away or terminated by the system.

Remote Access Malware Targets Argentina Through Banking Impersonation

The primary objective of PromptSpy is deploying a VNC module for remote control, granting threat actors complete access to infected devices

1

. Evidence suggests the campaign is targeting users in Argentina through a phishing site at m-mgarg[.]com, which appeared dressed up as impersonating JPMorgan Chase Argentina's banking brand

2

. The malware uses similar branding with the app name MorganArg and an icon inspired by Chase Bank, with "MorganArg" likely serving as shorthand for "Morgan Argentina."

Source: The Register

Source: The Register

ESET discovered PromptSpy after samples were uploaded to VirusTotal from Argentina earlier this month

1

. The distribution method involves a dedicated website "mgardownload[.]com" delivering a dropper that, when installed, contacts a hacker-controlled server to deploy the remaining malware components. This includes requesting Accessibility Service permissions, enabling attackers to see everything happening on the device and perform taps, swipes, gestures, and text input as though physically holding the phone.

Advanced Persistence on Infected Devices Through AI-Powered UI Navigation

The malware's use of Gemini AI to analyze user interface elements addresses a longstanding challenge in Android malware development

3

. Traditional Android malware relies on hardcoded taps, coordinates, and UI selectors that tend to break when running on different devices with varying screen sizes, layouts, or OS versions. By leveraging generative AI for UI navigation, PromptSpy can adapt to more or less any device configuration, significantly expanding the pool of potential victims

2

.

The malware achieves recent-apps persistence by assigning Gemini the persona of an "Android automation assistant" and providing natural language prompts alongside screen data

3

. The AI model and prompt are predefined in the code and cannot be changed, with actions executed through accessibility services without requiring user input. This approach enables real-time decision-making that makes the malware far more dynamic than conventional threats.

Capabilities Include Screen Recording and Lockscreen PIN Interception

Once operational, PromptSpy can intercept lockscreen PIN or password data, capture the pattern unlock screen as video, record the screen and user gestures, and take screenshots on demand

1

. The malware communicates with a hardcoded command-and-control server at 54.67.2[.]84 via the VNC protocol, receiving instructions and transmitting stolen data .

Source: PC Magazine

Source: PC Magazine

Removing the malware proves exceptionally difficult due to its defensive mechanisms. PromptSpy overlays transparent rectangles on specific screen areas that are invisible to users, blocking taps on the uninstall and force stop functions

1

. The only method for victims to remove it requires rebooting the device into Safe Mode, where third-party apps are disabled and can be uninstalled normally.

Chinese Development Indicators and Proof of Concept Status

Analysis of the code reveals Chinese language debug strings written in simplified Chinese, suggesting development in a Chinese-speaking environment . ESET notes that PromptSpy has not appeared in their telemetry findings, indicating it may remain a proof of concept rather than fully operational malware deployed at scale

2

. However, the existence of distribution domains suggests potential real-world deployment against select targets.

ESET researchers also identified PromptSpy as an advanced version of another previously unknown Android malware called VNCSpy, with samples first uploaded to VirusTotal from Hong Kong last month . The malware was never found on the Google Play Store, and as an App Defense Alliance partner, ESET shared findings with Google. Android users are automatically protected against known versions through Google Play Protect, which is enabled by default on devices with Google Play Services

1

.

Broader Implications for Malware Evolution and Data Extortion

PromptSpy represents the latest in a growing trend of malware utilizing generative AI capabilities. In November, Google warned about Windows-based malware strains dubbed Promptflux and Promptsteal that also connect to generative AI models to execute instructions

1

. Anthropic recently discovered hackers using its Claude AI chatbot to help plan large-scale data extortion campaigns and develop ransomware.

The finding follows ESET's work uncovering PromptLock, which the company initially described as the first AI-powered ransomware payload before learning it was a research project by New York University doctoral candidates

2

. While PromptSpy's Gemini component represents a relatively minor portion of its overall toolkit, it performs a critical function that could inspire future threat actors to incorporate similar AI-assisted capabilities. The ability to automate UI navigation through natural language processing could make mobile malware significantly more resilient and harder to detect, particularly as sideloading apps becomes more restricted on Android platforms.

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2026 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo