Researchers have identified PromptSpy, the first Android malware that leverages Googleβs Gemini generative AI to analyze on-screen UI and provide step-by-step instructions to automate malicious interactions. The malware uses those AI-driven instructions to pin itself in recent apps, deploy a VNC module for remote access, steal lockscreen credentials, and resist uninstallation. #PromptSpy #Gemini
Keypoints
- PromptSpy is the first reported Android malware to embed and abuse Gemini to interpret UI and drive interaction steps.
- The malware captures lockscreen data, takes screenshots, records screen video, and harvests device information.
- It sends an XML dump of the current screen to Gemini and executes the returned JSON actions via accessibility services to ensure persistence.
- PromptSpy deploys a built-in VNC module, communicates with C2 server 54.67.2[.]84, and provides remote attackers full device access.
- Delivered from a malicious site impersonating βMorganArgβ (JPMorgan Chase) and likely targeting Argentina, the app can only be removed by rebooting into Safe Mode.
Read More: https://thehackernews.com/2026/02/promptspy-android-malware-abuses-google.html