Android Weekly

Android malware/backdoors leveraging AI or firmware compromise, including PromptSpy, Gemini-abusing implants, KeenAdu, and large-scale fraud/hijack operations

Android malware/backdoors leveraging AI or firmware compromise, including PromptSpy, Gemini-abusing implants, KeenAdu, and large-scale fraud/hijack operations

AI-Assisted Android Malware Campaigns

As Android devices become increasingly central to everyday life, emerging malware and firmware backdoors are leveraging advanced AI capabilities and deep system compromises to evade detection and execute large-scale fraud and hijack campaigns. Recent discoveries reveal a troubling evolution in Android threats, where generative AI models like Google’s Gemini are weaponized within malware implants, and firmware-level backdoors embed themselves stealthily to maintain persistent control over devices.


Discovery and Behavior of New Android Malware and Firmware Backdoors

Security researchers have uncovered several sophisticated Android threats demonstrating novel infection vectors and AI-powered evasion techniques:

  • PromptSpy: The First Android Malware Using Generative AI at Runtime
    PromptSpy represents a watershed moment in mobile malware, being the first known Android malware to integrate generative AI directly into its execution flow. By harnessing AI models, PromptSpy dynamically generates malicious commands and adapts its behavior on the fly, making traditional static detection methods ineffective. This runtime AI integration allows it to perform complex tasks such as automating phishing attacks and data exfiltration with greater stealth and precision.

  • Gemini AI-Abusing Android Implants
    Multiple independent analyses have identified Android malware strains that hijack Google’s Gemini generative AI to facilitate persistence, automate malicious workflows, and evade detection. These implants query Gemini during runtime to decide subsequent actions, effectively using AI to adapt in real time to the device environment and security posture. Such malware can autonomously hide critical components, modify payload delivery, and optimize infection strategies without human intervention.

  • KeenAdu: Firmware-Level Android Backdoor
    KeenAdu is a recently uncovered backdoor implanted deep within Android device firmware and some Google Play apps, allowing attackers to maintain stealthy control over infected devices. Unlike typical malware confined to the OS or user space, KeenAdu operates below the operating system layer, leveraging firmware vulnerabilities and weak cryptographic verification to survive factory resets and evade conventional detection. Its firmware integration also enables it to tap into hardware-level functions, further complicating removal efforts.

  • Geographic and Targeted Spread
    The newly discovered firmware backdoors have been found targeting users primarily in Russia, Germany, and Japan, indicating a global and potentially state-sponsored or cybercrime-driven campaign. The integration within firmware and popular apps suggests a multi-vector infection strategy blending supply chain attacks with malicious app distribution.


Leveraging Gemini/Generative AI, Infection Vectors, and Campaign Scale

These emerging threats exploit both Android’s expanding AI capabilities and traditional infection vectors, amplifying their impact:

  • Gemini AI as a Malware Enabler
    The integration of Google’s Gemini AI into the Android OS—originally designed to enhance user convenience and security—has been subverted by malware authors to automate malicious behaviors. Generative AI models assist in crafting polymorphic code, evading heuristic detection, and tailoring attacks to specific device contexts. This AI-assisted adaptation represents a paradigm shift in mobile malware sophistication.

  • Infection Vectors: Firmware and Google Play Apps
    Malware campaigns are increasingly blending firmware compromise with malicious apps distributed via Google Play. KeenAdu illustrates this by embedding backdoors deep into device firmware, complemented by companion apps that facilitate command-and-control communications and payload delivery. Meanwhile, malware like PromptSpy and Gemini-abusing implants propagate through seemingly legitimate apps, exploiting permission escalations and user trust.

  • Large-Scale Fraud and Hijack Operations
    Google Play Protect’s recent enforcement actions have dismantled massive Android-based fraud schemes that capitalize on AI-generated content and automation:

    • Ad Fraud Campaign Affecting 25 Million Devices
      Google removed 115 apps tied to an ad fraud operation that leveraged generative AI to fabricate thousands of shell websites. These fake sites simulated legitimate user interactions, inflating ad impressions and siphoning advertising revenues on an unprecedented scale.

    • 9 Million Device Hijack Network
      Another disrupted campaign involved a network of free apps hijacking control over approximately 9 million devices. These apps stealthily commandeered device resources and leveraged AI-driven polymorphic techniques to evade detection, illustrating how generative AI can be weaponized to maintain large botnets and execute fraud or data theft.

  • AI-Powered Detection vs. AI-Powered Malware
    Google Play Protect’s use of AI to detect AI-driven malware reflects an escalating arms race between defenders and attackers. While Google’s AI models have matured to identify complex generative AI behaviors, the sophistication of AI-assisted malware continues to evolve rapidly, demanding continuous innovation in detection and prevention strategies.


Implications and Defensive Strategies

The emergence of AI-assisted malware and firmware backdoors poses significant challenges for Android security:

  • Persistence Beyond OS-Level Controls
    Firmware-level backdoors like KeenAdu can persist through factory resets and evade OS-level security controls, necessitating enhanced cryptographic firmware verification and rollback protections such as those implemented in Project Toscana.

  • Necessity of Hardware-Backed Protections
    Integration of hardware-backed runtime protections and biometric enclaves, as seen in Android 17 Beta 2 and Samsung’s Galaxy S26 series, is critical to safeguarding AI command execution and preventing unauthorized firmware modifications.

  • Supply Chain and App Vetting Vigilance
    The blending of firmware compromises with malicious apps underscores the importance of rigorous supply chain auditing, provenance verification, and continuous runtime monitoring to detect subtle anomalies indicative of AI-driven malware.

  • User Awareness and Update Adoption
    Prompt adoption of Android 17 and its Gemini AI enhancements is vital for users to benefit from advanced privacy controls and AI-powered anomaly detection that can mitigate these threats. Users should be cautious of sideloaded apps and prefer vetted sources, while developers must adopt least privilege principles and AI-aware runtime monitoring.


Conclusion

The intersection of generative AI, malware innovation, and firmware compromise marks a new frontier in Android security threats. Malware like PromptSpy and Gemini-abusing implants exploit AI to adapt in real time, while firmware backdoors such as KeenAdu enable persistent, stealthy control over millions of devices. Large-scale fraud and hijack campaigns leveraging these technologies have already impacted tens of millions of users worldwide.

Defense against this evolving threat landscape demands a multi-layered approach combining hardware-backed protections, AI-powered detection, supply chain security, and ecosystem-wide collaboration. As Android continues to integrate AI deeply into its platform, maintaining the delicate balance between innovation, privacy, and robust security will be paramount to protecting billions of users from AI-assisted malware and backdoor exploits.


Selected References

  • PromptSpy is the first known Android malware to use generative AI at runtime
  • Android Malware Harnesses Gemini For Real-Time Adaptation
  • Inside KeenAdu: The Android Backdoor Hiding in Plain Sight Across Firmware and Google Play Apps
  • EXCLUSIVE: Google Pulls 115 Android Apps Tied to Ad Fraud Scheme Affecting 25M Devices
  • Google dismantles 9M-device Android hijack network
  • New backdoor found in Android tablets targeting users in Russia, Germany and Japan
Sources (8)
Updated Feb 28, 2026
Android malware/backdoors leveraging AI or firmware compromise, including PromptSpy, Gemini-abusing implants, KeenAdu, and large-scale fraud/hijack operations - Android Weekly | NBot | nbot.ai