In a significant development for mobile security, researchers at ESET have discovered PromptSpy, the first known Android malware to actively weaponize a generative AI model, Google Gemini, as part of its attack chain. The malware uses the AI to interpret a device's user interface (UI) and generate precise instructions for navigation, allowing it to achieve persistence by programmatically 'pinning' itself in the recent apps list. This novel technique makes the malware highly adaptable to various Android versions and device layouts, overcoming a major hurdle for developers of malicious software. The ultimate payload is a Virtual Network Computing (VNC) module that grants attackers remote control over the device. While currently limited in distribution and targeting users in Argentina, PromptSpy represents a proof-of-concept for a new class of dynamic, AI-powered malware.
PromptSpy introduces a paradigm shift in malware design. Traditional Android malware that attempts UI manipulation relies on hardcoded coordinates or accessibility service abuse, which often fails across different device models, screen sizes, or OS versions. PromptSpy solves this problem with AI.
The malware's core innovation is its persistence mechanism. It operates as follows:
After achieving persistence, PromptSpy's main objective is to enable remote access via a built-in VNC module, allowing attackers to spy on the user, steal data, and perform actions on their behalf. It also includes capabilities to capture lockscreen data and block uninstallation attempts.
PromptSpy's use of AI for UI interaction is a form of Automated Manipulation of Android's User Interface (T1418), but executed in a novel way.
T1059): The malware executes the JSON-formatted commands returned by the Gemini AI.T1464): While not modifying a system app directly, the act of pinning itself in the recent apps list is a functional equivalent, achieving a form of user-level persistence that is difficult to reverse.T1419): Although it uses AI instead of just accessibility services, the end goal of UI manipulation is the same. The AI makes the abuse far more reliable and scalable.T1219): The final payload is a VNC server, giving the attacker full remote control of the device's screen and input.The weaponization of generative AI for dynamic execution marks a critical inflection point. Defenders can no longer rely on static signatures or predictable behavior. Malware can now adapt its behavior in real-time based on its environment, posing a significant challenge to traditional detection methods.
The immediate impact of PromptSpy is limited, as it appears to be a targeted or proof-of-concept campaign focused on Argentina (distributed via a fake JPMorgan Chase site). However, the long-term implications are profound.
For an infected user, the impact is severe: complete loss of privacy and control over their device, leading to theft of banking credentials, personal messages, and any other data accessible on the phone.
| Type | Value | Description |
|---|---|---|
| url_pattern | generativelanguage.googleapis.com |
The malware must make API calls to Google's AI services. Unexpected apps making calls to this endpoint is highly suspicious. |
| process_name | com.jpmorgan.morganarg |
The package name of the malicious app masquerading as JPMorgan Chase in Argentina. |
| network_traffic_pattern | App sending XML data outbound | An unusual pattern where a non-browser app is sending large XML files over the network. |
| file_name | VNCSpy |
The name of the VNC module used by the malware. |
generativelanguage.googleapis.com. This is the most reliable indicator of this specific malware. Apply D3FEND Outbound Traffic Filtering (D3-OTF).Prevent users from installing applications from untrusted, third-party sources.
Use Mobile Threat Defense to detect anomalous UI interactions and network connections to AI APIs.
Block or alert on traffic from non-standard apps to known generative AI API endpoints.
The primary distribution vector for PromptSpy was a malicious website, not the official Google Play Store. The most effective preventative measure is to enforce a strict policy of Executable Denylisting, which in the mobile context means blocking the installation of applications from 'Unknown Sources'. For enterprise environments, this should be enforced via a Mobile Device Management (MDM) policy that cannot be disabled by the user. For individual users, this setting should be enabled by default and they should be educated on the severe risks of sideloading applications. This simple configuration change would have prevented the PromptSpy malware from ever being installed on the device, neutralizing the threat before its advanced AI capabilities could be used.
To detect an active PromptSpy infection, defenders must focus on its unique network behavior. Implementing Network Traffic Analysis, either through an on-device MTD agent or at the network gateway, is crucial. The key indicator is traffic from an unexpected application to Google's generative AI API endpoint (generativelanguage.googleapis.com). A detection rule should be created to flag any process, other than an approved browser or explicitly authorized application, that initiates a connection to this domain. Further analysis could look for the specific pattern of an outbound POST request containing a large XML payload. This provides a high-confidence signature for this new class of AI-driven malware, allowing security teams to quickly identify and isolate compromised devices.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats