PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence

PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence

Researchers have identified PromptSpy, the first Android malware that leverages Google’s Gemini generative AI to analyze on-screen UI and provide step-by-step instructions to automate malicious interactions. The malware uses those AI-driven instructions to pin itself in recent apps, deploy a VNC module for remote access, steal lockscreen credentials, and resist uninstallation. #PromptSpy #Gemini

Keypoints

  • PromptSpy is the first reported Android malware to embed and abuse Gemini to interpret UI and drive interaction steps.
  • The malware captures lockscreen data, takes screenshots, records screen video, and harvests device information.
  • It sends an XML dump of the current screen to Gemini and executes the returned JSON actions via accessibility services to ensure persistence.
  • PromptSpy deploys a built-in VNC module, communicates with C2 server 54.67.2[.]84, and provides remote attackers full device access.
  • Delivered from a malicious site impersonating β€œMorganArg” (JPMorgan Chase) and likely targeting Argentina, the app can only be removed by rebooting into Safe Mode.

Read More: https://thehackernews.com/2026/02/promptspy-android-malware-abuses-google.html