Android Malware Leverages Generative AI for Runtime Attacks: PromptSpy Sets New Threat Landscape

Android-Malware-Leverages-Generative-AI-for-Runtime-Attacks-PromptSpy-Sets-New-Threat-Landscapedata-1

Researchers Discover New Android Malware Strain, PromptSpy, Leveraging AI for Persistence

Researchers have identified a new Android malware strain, dubbed PromptSpy, which leverages generative AI to enhance its persistence on infected devices.

AI-Powered Evasion Techniques

According to a report by ESET, PromptSpy utilizes Google’s Gemini model to adapt to different devices and evade detection.

The malware sends a chat prompt to Gemini, along with an XML dump of the current screen, including UI elements, text labels, and screen coordinates. Gemini responds with JSON-formatted instructions, which PromptSpy executes through Android’s Accessibility Service to pin the app in the Recent Apps list.

Primary Function: Spyware

The malware includes a built-in VNC module, granting threat actors full remote access to devices with Accessibility permissions.

This enables them to view and control the Android screen in real-time, as well as intercept lockscreen PINs or passwords, record screen activity, and capture screenshots.

Capabilities and Distribution

PromptSpy’s capabilities include:

  • Uploading a list of installed apps
  • Intercepting lockscreen PINs or passwords
  • Recording the pattern unlock screen as a video
  • Capturing screenshots on demand
  • Recording screen activity and user gestures
  • Reporting the current foreground application and screen status

Although ESET has not observed PromptSpy in its telemetry, the malware’s distribution via a dedicated domain suggests it may be more than a proof-of-concept.

Implications and Conclusion

The emergence of AI-driven malware like PromptSpy highlights the need for continued vigilance and innovation in the field of cybersecurity.

As threat actors increasingly leverage AI to enhance their attacks, security researchers and professionals must stay ahead of the curve to develop effective countermeasures.



About Author

en_USEnglish