Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Android Malware Uses AI for Extended Device Control

Android Malware Uses AI for Extended Device Control

Posted on February 20, 2026 By CWS

Security researchers at ESET have unveiled a novel threat in the form of an Android malware, PromptSpy, which uniquely employs generative AI to maintain its presence on devices. This marks the first instance of such technology being utilized in malware for Android systems, adding a sophisticated layer to its operational capabilities.

Malware Capabilities and Device Control

PromptSpy integrates a VNC module into compromised Android devices, enabling attackers to remotely access and manipulate the device’s interface. The malware’s capabilities extend to gathering comprehensive device information, capturing lockscreen credentials, and recording screen activities to deduce unlock patterns. This comprehensive data collection allows the malware to exert extensive control over infected devices.

AI-Powered Persistence Mechanism

In a breakthrough approach, PromptSpy employs Google’s Gemini AI chatbot to sustain its presence on devices. During runtime, the malware sends prompts to Gemini, accompanied by XML files that describe the screen’s UI elements. Gemini processes this data and provides JSON-based instructions on how to interact with the device, effectively adding the malware to the recent apps list. By exploiting Android’s Accessibility Services, PromptSpy executes these interactions seamlessly, ensuring its persistence across reboots.

Obstruction of Malware Removal

PromptSpy further complicates its removal by using Accessibility Services to obscure uninstall attempts. It overlays transparent blocks over critical screen elements, making actions like ‘stop’, ‘end’, or ‘uninstall’ ineffective. This tactic necessitates users to reboot their devices in Safe Mode to successfully remove the malware, bypassing third-party app functionalities.

Although ESET has not observed widespread infections, the presence of a domain targeting users in Argentina suggests potential distribution. Researchers attribute the malware to developers in China, albeit with moderate confidence, and have not linked it to any known threat actors.

PromptSpy’s emergence, although not yet widespread, underscores the evolving landscape of mobile threats, emphasizing the need for robust security measures. Continued vigilance and updates are critical as developers and security experts work to counteract such sophisticated threats.

Security Week News Tags:accessibility services, AI malware, Android security, Chinese developers, Cybersecurity, device control, ESET, Gemini AI, malware persistence, malware removal, mobile security, PromptSpy, proof-of-concept, Safe Mode, VNC module

Post navigation

Previous Post: Google Releases Urgent Chrome Security Patch for Critical Flaws
Next Post: Phishing Campaign Exploits OAuth Tokens in Microsoft 365

Related Posts

All SonicWall Cloud Backup Users Had Firewall Configurations Stolen All SonicWall Cloud Backup Users Had Firewall Configurations Stolen Security Week News
Varonis Acquires AllTrue.ai to Enhance AI Security Varonis Acquires AllTrue.ai to Enhance AI Security Security Week News
Check Point to Acquire AI Security Firm Lakera Check Point to Acquire AI Security Firm Lakera Security Week News
Nevada Confirms Ransomware Attack Behind Statewide Service Disruptions Nevada Confirms Ransomware Attack Behind Statewide Service Disruptions Security Week News
AI Emerges as the Hope—and Risk—for Overloaded SOCs AI Emerges as the Hope—and Risk—for Overloaded SOCs Security Week News
Reporters Without Borders Targeted by Russian Hackers Reporters Without Borders Targeted by Russian Hackers Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News