Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Android AI Malware Uses Google’s Gemini for New Threats

Android AI Malware Uses Google’s Gemini for New Threats

Posted on February 19, 2026 By CWS

The discovery of the first Android malware family leveraging a generative AI model marks a new chapter in mobile security threats. This malware utilizes Google’s Gemini AI to enhance its operational execution. Initially identified in February 2026, it signifies a notable advancement in malicious mobile activities, following ESET’s earlier detection of PromptLock, an AI-driven ransomware, back in August 2025.

Origins and Development

ESET researcher Lukas Stefanko uncovered this malware, dubbed PromptSpy, which evolved from an earlier variant known internally as VNCSpy. Evidence of its existence surfaced when three samples were found on VirusTotal on January 13, 2026, originating from Hong Kong. By February 10, 2026, more sophisticated versions integrating the Gemini AI were detected, uploaded from Argentina, leading ESET to classify them under the PromptSpy family.

Distribution and Deception Tactics

Disguised as a Chase Bank-themed app named MorganArg, this malware was distributed through the now-defunct domain mgardownload[.]com, posing as a login interface for JPMorgan Chase Bank. Although ESET’s telemetry hasn’t recorded any direct infections, the establishment of a specialized distribution network indicates a probable intent for real-world deployment.

Analysis of the malware reveals debug strings and code in simplified Chinese, suggesting its development within a Chinese-speaking environment. This is further reinforced by Chinese-localized accessibility handlers, pointing to the malware’s origins.

Technical Sophistication and Capabilities

Unlike traditional Android malware that depends on static screen coordinates, PromptSpy employs Gemini to overcome device-specific challenges. By sending natural-language prompts and real-time UI data to the AI, the malware receives precise instructions to perform actions like locking the malicious app in the multitasking view, making it resistant to user intervention.

PromptSpy’s primary goal is to execute a VNC module for remote control over the infected device. Once accessibility services are activated, the malware can capture lockscreen credentials, take screenshots, and monitor app activities. It uses AES encryption to communicate with its command server, ensuring secure data transmission.

Despite its sophistication, PromptSpy has not been found on Google Play. ESET has collaborated with Google to enhance user protection through the App Defense Alliance, ensuring Google Play Protect shields users from known threats.

Indicators of compromise include various SHA-1 hashes associated with the malware, alongside IP addresses linked to its distribution and command servers. These indicators are crucial for cybersecurity professionals to identify and mitigate the malware’s impact.

Stay updated on cybersecurity trends by following us on Google News, LinkedIn, and X. Reach out for more insights or to feature relevant stories in our coverage.

Cyber Security News Tags:AI model, Android malware, Cybersecurity, ESET, Gemini AI, Google, mobile security, mobile threats, PromptSpy, VNCSpy

Post navigation

Previous Post: New Android Malware Uses AI for Persistent Threats
Next Post: INTERPOL’s Cybercrime Crackdown Nets 651 Arrests in Africa

Related Posts

Key Cybersecurity Threats: Notepad++ Hack & Office 0-Day Key Cybersecurity Threats: Notepad++ Hack & Office 0-Day Cyber Security News
SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability Cyber Security News
ServiceNow Platform Vulnerability Let Attackers Exfiltrate Sensitive Data ServiceNow Platform Vulnerability Let Attackers Exfiltrate Sensitive Data Cyber Security News
Building a Scalable Cybersecurity Training Program Building a Scalable Cybersecurity Training Program Cyber Security News
LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware Cyber Security News
Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Addresses High-Severity Windows Admin Center Flaw
  • Phishing Campaign Targets Job Seekers with Fake Google Forms
  • INTERPOL’s Cybercrime Crackdown Nets 651 Arrests in Africa
  • Android AI Malware Uses Google’s Gemini for New Threats
  • New Android Malware Uses AI for Persistent Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Addresses High-Severity Windows Admin Center Flaw
  • Phishing Campaign Targets Job Seekers with Fake Google Forms
  • INTERPOL’s Cybercrime Crackdown Nets 651 Arrests in Africa
  • Android AI Malware Uses Google’s Gemini for New Threats
  • New Android Malware Uses AI for Persistent Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News