PromptSpy: First Android Malware Using Gemini AI at Runtime
ESET discovers PromptSpy, the first Android malware weaponizing Google's Gemini AI to maintain persistence by analyzing UI and generating real-time tap instructions to stay pinned in recent apps.
ESET researchers have discovered what they describe as the first Android malware abusing Google's Gemini AI as part of its execution flow. Codenamed PromptSpy, the malware uses generative AI at runtime to analyze device screens and generate step-by-step instructions for maintaining persistence—a capability that marks a concerning evolution in mobile threats.
The discovery follows months of warnings about AI-powered attack tools. PromptSpy demonstrates that those concerns weren't hypothetical: threat actors have now weaponized commercially available AI services in production malware.
How PromptSpy Weaponizes Gemini
According to ESET's research, PromptSpy uses Gemini to solve a specific problem—keeping the malicious app pinned in Android's recent apps list to prevent removal.
The process works like this:
- PromptSpy captures the current screen's UI XML layout
- The malware sends this data to Google's Gemini API with a prompt requesting navigation instructions
- Gemini analyzes the UI structure and returns JSON-formatted tap/swipe commands
- PromptSpy executes those commands programmatically
- The interaction repeats until the app is successfully locked in place
This approach gives the malware adaptability that hard-coded routines can't match. Different Android versions, device manufacturers, and launcher customizations all present different UI layouts. By using Gemini to interpret each screen dynamically, PromptSpy handles variations that would otherwise require extensive device-specific development.
Capabilities Beyond Persistence
Once established, PromptSpy's feature set extends well beyond staying hidden:
- VNC module deployment for complete remote device access
- Lockscreen credential capture through overlay attacks
- Screen recording and screenshot functionality
- Device reconnaissance including installed apps and system info
- Uninstallation blocking to prevent removal
The VNC capability represents the primary goal: granting attackers real-time remote access to infected devices. Combined with credential theft, this enables account takeovers, financial fraud, and access to corporate resources via mobile enterprise apps.
Campaign Origins and Targeting
BleepingComputer reports that ESET tracked two variants. The first, named VNCSpy, appeared on VirusTotal on January 13, 2026, uploaded from Hong Kong. Four more advanced samples—the PromptSpy variants with Gemini integration—were uploaded from Argentina on February 10, 2026.
Language localization clues and observed distribution vectors point toward financially motivated attacks primarily targeting Argentina. The campaign appears to use fake banking or financial apps as lures, consistent with the credential theft and VNC access capabilities.
The AI-Powered Malware Threat
PromptSpy's emergence validates concerns raised throughout 2025 about generative AI weaponization. We've previously covered how infostealers are now targeting AI agent configurations, but PromptSpy represents something different: malware that actively uses AI services to enhance its own capabilities.
The implications extend beyond Android. If threat actors successfully integrate commercial AI APIs into malware, we can expect similar approaches across platforms:
- Windows malware using AI to interpret GUI layouts for persistence
- Automated social engineering where malware crafts contextual phishing messages
- Adaptive evasion where AI suggests techniques based on detected security products
Google's Gemini API is designed for legitimate developer use cases. PromptSpy's abuse highlights the challenge of preventing malicious consumption of AI services that must remain accessible for legitimate applications.
Detection and Protection
Organizations and individuals should consider these defensive measures:
- Install apps only from Google Play and verified enterprise app stores
- Enable Play Protect and keep it updated
- Review accessibility permissions carefully—PromptSpy requires these to interact with UI
- Monitor for unusual network activity to AI service endpoints
- Deploy mobile threat defense solutions with behavioral analysis
Enterprise environments should also consider mobile application management (MAM) policies that restrict which apps can access accessibility services—a common requirement for malware that needs to interact with device UI.
Why This Matters
PromptSpy represents a proof of concept that will almost certainly inspire copycats. The technique isn't particularly sophisticated in isolation—it's the combination of accessibility abuse with AI-driven adaptability that creates something new.
For security teams tracking malware evolution, PromptSpy signals that AI integration is no longer theoretical. Threat intelligence should now include monitoring for malware samples making API calls to commercial AI services.
For a broader understanding of how mobile malware operates and how to protect devices, review our malware protection guide covering threat categories and defensive strategies.
Related Articles
Malicious Chrome Extensions Target Meta Business, VK, AI Tools
Researchers expose three Chrome extension campaigns stealing Meta Business Suite exports, VK accounts, and AI chatbot conversations from over 760,000 users.
Feb 14, 2026FBI: BadBox 2.0 Malware Pre-Installed on 1M+ Android Devices
Budget Android TV boxes and tablets ship with backdoors from the factory, turning home networks into criminal infrastructure for ad fraud and proxy services.
Jan 18, 2026Matanbuchus 3.0 Loader Delivers AstarionRAT in Hands-On Intrusion
Huntress responds to ClickFix intrusion deploying Matanbuchus 3.0 and custom AstarionRAT. Attackers achieved lateral movement within 40 minutes.
Feb 25, 2026ClickFix Campaign Deploys MIMICRAT Through Compromised BIN Sites
Elastic Security Labs uncovers ClickFix campaign abusing compromised bincheck.io to deliver MIMICRAT, a custom C++ RAT with SOCKS5 tunneling and token impersonation capabilities.
Feb 21, 2026