PromptSpy ushers in the era of Android threats using GenAI#1917
Open
carlospolop wants to merge 1 commit intomasterfrom
Open
PromptSpy ushers in the era of Android threats using GenAI#1917carlospolop wants to merge 1 commit intomasterfrom
carlospolop wants to merge 1 commit intomasterfrom
Conversation
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: https://www.welivesecurity.com/en/eset-research/promptspy-ushers-in-era-android-threats-using-genai/ Content Categories: Based on the analysis, this content was categorized under "Mobile Pentesting -> Android Applications Pentesting -> Accessibility Services Abuse (add subsection: LLM/GenAI-driven UI automation via Accessibility UI XML prompts)". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Overview
ESET describes PromptSpy, the first known Android malware family observed to abuse generative AI (Google Gemini) inside its execution flow to perform context-aware UI automation. The GenAI usage is focused on a persistence subroutine (locking/pinning the malicious app in the Recent Apps list), but the main payload is a built-in VNC remote access component (full interactive remote control). The malware also abuses Accessibi...
🔧 Technical Details
GenAI-driven UI automation loop (prompt-in-the-loop): Use Android Accessibility to dump the current UI tree as XML (including node
boundsformatted[left,top][right,bottom]), then prompt a generative AI model to return strict JSON instructions (status= IN_PROGRESS/COMPLETED/IMPOSSIBLE plusaction_typelike CLICK/LONG_CLICK/SWIPE). The model is instructed to compute click coordinates by taking the center of the bounds rectangle and to only markCOMPLETEDwhen the XML shows explicit evidence of success. Execute the action via Accessibility, re-dump UI XML, and iterate while preserving prior prompts/responses for context. This makes device/vendor-specific UI workflows (e.g., “lock app in Recents”) resilient across different Android skins and layouts.VNC RAT over encrypted channel: Embed a VNC component for interactive remote control (screen viewing + input injection via Accessibility). Communicate with a ha...
🤖 Agent Actions
Updated accessibility-services-abuse.md with a new subsection on LLM/GenAI-driven UI automation, detailing the XML dump → strict JSON action → Accessibility execution loop (coordinates derived from bounds) used to lock/pin apps across OEM UIs. Added anti-removal transparent overlay technique targeting uninstall/Accessibility flows, and referenced the PromptSpy blog in the References section.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.