PromptSpy Android Malware Abuses Gemini AI

Cybersecurity researchers discovered a clever Android malware. It abuses Google’s Gemini AI for persistence. PromptSpy keeps itself pinned in recent apps automatically.

How PromptSpy Uses Gemini

The malware sends the current screen XML dump to Gemini. It includes every UI element with text and position. Gemini acts as an “Android automation assistant.” It returns JSON instructions for taps and actions.

This loop continues until the app locks in recent apps. For example, it prevents swiping away or system kills. Therefore, the malware survives longer on devices. This adapts to any screen layout or Android version.

Main Capabilities of PromptSpy

PromptSpy captures lockscreen PINs and patterns. It records screen activity as video. Moreover, it takes screenshots on demand. The malware gathers device details too. It blocks uninstallation with invisible overlays. Accessibility services execute all actions silently. Attackers gain remote control via a built-in VNC module. The VNC connects to a fixed server for commands.

A dedicated website drops the malware. It pretends to be a banking app from Morgan Argentina. Victims see Spanish instructions for updates. The dropper requests unknown source permissions.

The campaign likely targets users in Argentina for financial gain. Debug strings suggest Chinese-speaking developers. However, samples first appeared from Hong Kong. This points to a financially motivated effort.

PromptSpy improves on a previous trojan called VNCSpy. It adds Gemini for smarter persistence. The AI handles UI changes dynamically. Consequently, hardcoded methods become outdated. Traditional malware struggles with varied devices. PromptSpy overcomes this limitation. It hands Gemini a screen snapshot. Gemini provides precise steps in return.

Why This Marks a Change

This malware shows AI integration in mobile threats. It automates complex UI navigation. For instance, it adapts to different OS builds easily. Therefore, the victim pool grows much larger.

Attackers no longer need device-specific code. Gemini handles variations in real time. This makes removal harder without Safe Mode reboots.

Prevention Strategies

Users can protect devices with simple strong habits. First, avoid sideloading apps from unknown websites. Always verify banking or update prompts carefully. Moreover, use continuous monitoring to detect unusual accessibility service usage or frequent API calls to AI endpoints early.

Restrict unknown source installations by default. Enable automatic scans for suspicious overlays or VNC activity. These steps greatly reduce the risk of AI-abusing malware like PromptSpy taking control.

Sleep well, we got you covered.

Scroll to Top