IoCs available in our GitHub repo: github.com/eset/malware... 6/6
19.02.2026 10:37 β π 3 π 0 π¬ 0 π 0IoCs available in our GitHub repo: github.com/eset/malware... 6/6
19.02.2026 10:37 β π 3 π 0 π¬ 0 π 0The analyzed samples are available on VirusTotal and seem to be used in a real campaign targeting users in π¦π·, though we canβt rule out them being a part of a proof-of-concept. At the same time, the analyzed malware samples point toward PromptSpy being developed in a Chinese-speaking environment. 5/6
19.02.2026 10:37 β π 3 π 0 π¬ 1 π 0PromptSpy abuses Accessibility Services to deploy a #VNC module on victim devices, so attackers can see the screen and perform actions remotely, as well as block the victim from manually uninstalling the malicious app (which uses invisible overlays, here marked in red). 4/6
19.02.2026 10:37 β π 3 π 0 π¬ 1 π 0Since Android malware often relies on hardcoded UI navigation, employing generative AI enables the threat actors to adapt to more or less any device, layout, or OS version, which can greatly increase the number of potential victims. 3/6
19.02.2026 10:37 β π 2 π 0 π¬ 1 π 0Gemini is used to analyze the current screen and provide PromptSpy with step-by-step instructions to ensure that the malicious app remains pinned in the recent apps list, preventing it from being easily swiped away or killed by the system. 2/6
19.02.2026 10:37 β π 2 π 0 π¬ 1 π 0#BREAKING #ESETresearch has discovered the first known Android malware to use generative AI in its execution flow; we have named it #PromptSpy. The malware abuses Googleβs #Gemini to achieve persistence on the compromised device. www.welivesecurity.com/en/eset-rese... 1/6
19.02.2026 10:37 β π 10 π 8 π¬ 1 π 0IoCs available in our GitHub repo: github.com/eset/malware... 5/5
30.01.2026 10:29 β π 2 π 0 π¬ 1 π 0ZOV is destructive malware that we detected being deployed against a financial institution in Ukraine in Nov 2025. When the ZOV wiper runs, it destroys files by overwriting them with the string ZOV changes the desktop wallpaper. Z, O, and V are symbols used by the Russian military in Ukraine. 4/5
30.01.2026 10:29 β π 2 π 0 π¬ 1 π 0#ESETresearch attributes the attack to the Russiaβaligned #Sandworm with medium confidence, based on strong overlaps in behavior & TTPs with multiple earlier Sandworm attacks. Specifically, DynoWiper operates in a broadly similar fashion to ZOV wiper attributed to Sandworm with high confidence. 3/5
30.01.2026 10:29 β π 2 π 0 π¬ 1 π 0
@CERT_Polska_en did an excellent job investigating the incident and published a detailed analysis in a report:
cert.pl/en/posts/202... 2/5
#BREAKING #ESETresearch provides technical details on #DynoWiper, a dataβwiping malware used in a dataβdestruction incident on December 29, 2025, affecting a company in Polandβs energy sector. www.welivesecurity.com/en/eset-rese... 1/5
30.01.2026 10:29 β π 11 π 9 π¬ 1 π 1
IoCs available in our GitHub repo: github.com/eset/malware...
Read the full analysis on WeLiveSecurity: www.welivesecurity.com/en/eset-rese... 9/9
The operation blends mobile spyware, social engineering, and desktop exploitation, targeting users in π΅π° Pakistan. Despite its specific targeting, there are insufficient similarities in TTPs to attribute this campaign to any known threat actor at this point. 8/9
28.01.2026 10:49 β π 3 π 0 π¬ 1 π 0The same domain (buildthenations[.]info), also used to impersonate the Ministry of Defence website, mimics Pakistanβs Emergency Response Team and delivers a payload via #ClickFix, targeting desktop devices. 7/9
28.01.2026 10:49 β π 1 π 0 π¬ 1 π 0The GhostChat campaign is part of a broader, multiplatform, spy operation. In related activity, victims are lured into scanning QR codes on websites impersonating Pakistanβs Ministry of Defence, thereby giving the threat actors access to private #WhatsApp communications. 6/9
28.01.2026 10:49 β π 2 π 0 π¬ 1 π 0Upon installation, GhostChat immediately requests permissions and begins exfiltrating data β even before login. It continuously monitors new images, scans for documents every five minutes, and exfiltrates sensitive information from the device. 5/9
28.01.2026 10:49 β π 2 π 0 π¬ 1 π 0This impression of personalization and exclusive access is rarely seen in mobile threat campaigns and suggests a highly targeted social engineering effort. Under its faΓ§ade lies the true purpose of the app: data exfiltration. 4/9
28.01.2026 10:49 β π 2 π 0 π¬ 1 π 0The credentials and codes are not processed by any server and are hardcoded in the app, implying that they are probably distributed along with the app by the threat actor. 3/9
28.01.2026 10:49 β π 2 π 0 π¬ 1 π 0The spyware used in the campaign, which we named #GhostChat, uses the icon of a legitimate chat app. After installation from unknown sources, login credentials and unlock codes are required to access the app and individual chat profiles, respectively. 2/9
28.01.2026 10:49 β π 1 π 0 π¬ 1 π 0#ESETresearch has uncovered a new #Android spyware campaign using novel romance scam tactics to target individuals in π΅π° Pakistan, with an added social engineering element previously unseen in similar schemes. www.welivesecurity.com/en/eset-rese... 1/9
28.01.2026 10:49 β π 9 π 4 π¬ 1 π 0We continue to investigate the incident and broader implications. As new evidence or links to additional Sandworm activity emerge, we will share further updates to help defenders protect critical sectors. 5/5
23.01.2026 16:30 β π 8 π 1 π¬ 1 π 0#ESET detects DynoWiper as Win32/KillFiles.NMO. Customers of our private ESET Threat Intelligence APT reports have already received additional technical details and IOCs to support rapid detection and response. IoC: 4EC3C90846AF6B79EE1A5188EEFA3FD21F6D4CF6 4/5
23.01.2026 16:30 β π 10 π 2 π¬ 1 π 0The attack struck during peak winter and the 10βyear anniversary of Sandwormβs 2015 attack on πΊπ¦ Ukraineβs power grid - the first malware-driven blackout, leaving ~230,000 people without electricity. 3/5
23.01.2026 16:30 β π 7 π 1 π¬ 1 π 0#ESETresearch attributes the attack to the Russiaβaligned #Sandworm APT group with medium confidence, based on strong overlaps in behavior and TTPs with multiple earlier Sandworm-linked wiper operations investigated by our team. 2/5
23.01.2026 16:30 β π 8 π 1 π¬ 1 π 0#BREAKING #ESETresearch identified the wiper #DynoWiper used in an attempted disruptive cyberattack against the Polish energy sector on Dec 29, 2025. At this point, no successful disruption is known, but the malwareβs design clearly indicates destructive intent. 1/5
23.01.2026 16:30 β π 35 π 30 π¬ 1 π 5#ESETresearchβs Lukas Stefanko will speak at Ransomware Resilience 2026 on Mon, Jan 19 in Kuala Lumpur at 4pm local time! Discover how Android NFC threats evolved to enable unauthorized ATM withdrawals. Learn about NGate - first Android malware to execute NFC relay attack for remote ATM cash-outs.
16.01.2026 12:37 β π 3 π 0 π¬ 0 π 0Read more about the evolution of NFC threat landscape in the latest #ESETThreatReport web-assets.esetstatic.com/wls/en/paper... 6/6
15.01.2026 09:50 β π 0 π 0 π¬ 0 π 0Attackers remain faithful to tried-and-tested methods like #phishing calls and messages, while increasingly relying on psychological manipulation and #social engineering rather than exploiting just the technological aspect of NFC. 5/6
15.01.2026 09:50 β π 0 π 0 π¬ 1 π 0And #RatOn combines RAT-like features with relay functionality, showcasing the determination of threat actors to evolve the methods of compromise. Itβs distributed via fraudulent ads and apps, with the language targeting Czech and Slovak users. 4/6
15.01.2026 09:50 β π 1 π 0 π¬ 1 π 0An NGate-based malware adapted for Brazil, #PhantomCard, targets banking clients via fake #Android apps that claim to improve security and privacy, distributed on pages featuring fabricated positive reviews. 3/6
15.01.2026 09:50 β π 0 π 0 π¬ 1 π 0