• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
TechTrendFeed
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
TechTrendFeed
No Result
View All Result

How CallPhantom methods Android customers

Admin by Admin
May 8, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


There’s an app for all the pieces these days… proper? Effectively, wanting up name data for a cellphone variety of selection is not a type of issues, as doubtlessly hundreds of thousands of Android customers came upon after paying for app subscriptions promising simply that.

The offending apps, which we named CallPhantom primarily based on their false claims, purport to supply entry to name histories, SMS data, and even WhatsApp name logs for any cellphone quantity. To unlock this supposed characteristic, customers are requested to pay – however all they get in return is randomly generated information.

Our investigation recognized 28 such fraudulent apps out there on the Google Play retailer, cumulatively downloaded greater than 7.3 million occasions. As an App Protection Alliance associate, we reported our findings to Google, which eliminated all the apps recognized on this report from Google Play.

Key factors of this blogpost:

  • A brand new Android rip-off, CallPhantom, falsely claims to supply entry to name logs, SMS data, and WhatsApp name historical past for any cellphone quantity in change for fee.
  • We recognized and reported 28 CallPhantom apps on Google Play, cumulatively downloaded greater than 7.3 million occasions.
  • Some CallPhantom apps sidestep Google Play’s official billing system, complicating victims’ refund efforts.

Investigation

In November 2025, we got here throughout a Reddit submit discussing an app named Name Historical past of Any Quantity, discovered on Google Play. The app, proven in Determine 1, claims that it might probably retrieve the decision historical past of any cellphone quantity equipped by the person. It was revealed below the developer identify Indian gov.in, however the app has no actual affiliation with the Indian authorities.

Figure 1. Call History of Any Number app on Google Play
Determine 1. Name Historical past of Any Quantity app on Google Play

Unsurprisingly, our evaluation confirmed that the “name historical past” information offered by this app is totally fabricated – the app generates random cellphone numbers and matches them with fastened names, name occasions, and name durations, which had been embedded instantly within the code, as proven in Determine 2. This faux information is then offered to victims – however solely after fee.

Figure 2. Hardcoded call log data used by the app
Determine 2. Hardcoded name log information utilized by the app

A screenshot of the fabricated name historical past information was even included within the app’s itemizing, offered as an illustration of the app’s performance, as proven in Determine 3.

Figure 3. Screenshots from Google Play
Determine 3. Screenshots from Google Play seemingly demonstrating the fraudulent app’s performance; the logs are randomly generated from hardcoded information

Additional analysis revealed extra, associated apps out there on the Play Retailer – 28 CallPhantom apps altogether. We reported the total set of fraudulent apps to Google on December 16th, 2025. On the time of publication, all of the reported apps have been faraway from the shop.

Regardless of visible variations, which will be seen in Determine 4 and Determine 5, the aim of the apps is equivalent: generate faux communication information and cost victims for entry. The desk within the Analyzed CallPhantom apps part lists every app together with its key particulars, together with the obtain rely.

Figure 4. Examples of CallPhantom apps found on the Play Store
Determine 4. Examples of CallPhantom apps discovered on the Play Retailer
Figure 5. Examples of CallPhantom initial screens
Determine 5. Examples of CallPhantom preliminary screens

Marketing campaign overview

The CallPhantom apps we discovered on Google Play primarily focused Android customers in India and the broader Asia‑Pacific area. Lots of the apps got here with India’s +91 nation code preselected and assist UPI, a fee system used primarily in India.

The apps had garnered quite a few unfavorable critiques, with victims reporting that they had been scammed and by no means obtained the promised information, as will be seen in Determine 6.

Figure 6. Negative reviews for one of the fraudulent apps
Determine 6. Unfavourable critiques for one of many fraudulent apps

It’s not clear how the apps had been distributed or promoted. Presumably, by seemingly providing perception into personal data, the scammers efficiently took benefit of individuals’s curiosity. Mixed with a couple of glowing (faux) critiques, it may need appeared like an intriguing supply.

CallPhantom overview

In our investigation, we recognized two fundamental clusters of those fraudulent apps.

The apps within the first cluster comprise hardcoded names, nation codes, and templates of their code, as proven in Determine 7. These are mixed with randomly generated cellphone numbers and proven to the person as partial “outcomes”. To view the total (faux) historical past, the sufferer has to pay.

Figure 7. Code responsible for generating messages
Determine 7. Code answerable for producing messages

The apps within the second cluster ask customers to enter an e-mail deal with the place the “retrieved” name historical past would supposedly be delivered, as seen within the screenshots in Determine 8. No information era happens till after fee; customers must pay or subscribe earlier than any e-mail would supposedly be despatched.

Figure 8. CallPhantom requests the user’s email address
Determine 8. CallPhantom requests the person’s e-mail deal with the place name logs would supposedly be delivered

Usually, CallPhantom apps have a easy person interface and don’t request any intrusive or delicate permissions – they don’t must. Coincidentally, they don’t comprise any performance able to retrieving actual name, SMS, or WhatsApp information.

Within the CallPhantom apps we analyzed, we noticed three totally different fee strategies used, the latter two of that are in violation of Google Play’s funds coverage.

First, a few of the apps relied on subscriptions through Google Play’s official billing system. That is required of apps providing in-app purchases, per Google Play’s funds coverage; such purchases are lined by Google’s refund safety.

Second, a few of the apps relied on funds through third-party apps that assist UPI. For these third-party fee apps, CallPhantom apps both included hardcoded URLs or fetched the URLs dynamically from a Firebase realtime database, that means the fee account might be modified at any time by the operator.

Third, in some instances, fee card checkout types had been included instantly within the CallPhantom apps.

Examples of the fee strategies will be seen in Determine 9.

Figure 9. Various payment options used by CallPhantom apps
Determine 9. Varied fee choices utilized by CallPhantom apps

In a single case, we noticed an extra tactic used to coax the person into paying: if the person exited the app with out fee, the app displayed misleading alerts styled as new emails claiming that the decision historical past outcomes had arrived – see Determine 10. Clicking the notification led straight to a subscription display screen.

Figure 10. Deceptive notification displayed by CallPhantom to persuade users to subscribe
Determine 10. Misleading notification displayed by CallPhantom to influence customers to subscribe

The charges requested for the faux service differ broadly throughout the apps. The apps additionally seem to supply totally different subscription packages, reminiscent of weekly, month-to-month, or yearly providers, with the best requested worth sitting at US$80. For the bottom “subscription tier”, the common requested worth was €5.

What to do you probably have been scammed

Usually, subscriptions bought by the official Google Play billing system will be canceled within the Play Retailer app by tapping your profile icon, navigating to Funds & subscriptions → Subscriptions, choosing the lively subscription, and tapping Cancel subscription. Google explains the total course of on its Cancel, pause, or change a subscription on Google Play web page.

For the 28 apps described on this blogpost, present subscriptions have been canceled when the apps had been faraway from Google Play.

In some instances, refunds for Google Play purchases are doable. Google might concern a refund relying on the time since buy, the kind of merchandise, and its refund coverage. Usually, requests have to be made inside the allowed refund window as described on Google’s assist web page.

If the acquisition was made exterior Google Play – for instance, by coming into fee card particulars contained in the app or by paying by third‑celebration providers – then Google can’t cancel the subscription or concern a refund, and customers must contact the fee supplier or the app developer instantly.

Conclusion

We recognized a brand new cluster of fraudulent Android apps on Google Play that collectively amassed over 7.3 million downloads earlier than being taken down upon notification by ESET. These apps, which we collectively named CallPhantom, falsely promise to retrieve name logs, SMS data, and WhatsApp name historical past for any cellphone quantity, a technically unimaginable declare designed solely to use individuals’s curiosity and mislead them into paying.

Lots of the apps circumvented Google Play’s official billing system, pushing customers towards third‑celebration funds or direct card entry, complicating refund efforts and exposing victims to monetary threat.

Our evaluation revealed that the “outcomes” proven to victims are totally fabricated, usually utilizing hardcoded Indian numbers, predefined names, and generated timestamps disguised as actual communication information.

Customers who subscribed through official Google Play billing could also be eligible for refunds below Google’s refund insurance policies. Purchases made through third‑celebration fee apps or by direct fee card entry can’t be refunded by Google, leaving customers depending on exterior fee suppliers or builders.

For any inquiries about our analysis revealed on WeLiveSecurity, please contact us at threatintel@eset.com. 
ESET Analysis gives personal APT intelligence studies and information feeds. For any inquiries about this service, go to the ESET Menace Intelligence web page.

Analyzed CallPhantom apps

App identify Package deal identify Variety of downloads
Name historical past : any quantity deta calldetaila.ndcallhisto.rytogetan.ynumber 3M+
Name Historical past of Any Quantity com.pixelxinnovation.supervisor 1M+
Name Particulars of Any Quantity com.app.name.element.historical past 1M+
Name Historical past Any Quantity Element sc.name.ofany.mobiledetail 500K+
Name Historical past Any Quantity Element com.cddhaduk.callerid.block.contact 500K+
Name Historical past Of Any Quantity com.basehistory.historydownloading 500K+
Name Historical past of Any Numbers com.name.of.any.quantity 100K+
Name Historical past Of Any Quantity com.rajni.callhistory 100K+
Name Historical past Any Quantity Element com.callhistory.calldetails.callerids.callerhistory.callhostoryanynumber.getcall.history.callhistorymanager 100K+
Name Historical past Any Quantity Element com.callinformative.instantcallhistorical past.callhistorybluethem.callinfo 100K+
Name Historical past Any Quantity element com.name.element.caller.historical past 100K+
Name Historical past Any Quantity Element com.anycallinformation.datadetailswho.callinfo.numberfinder 100K+
Name Historical past Any Quantity Element com.callhistory.callhistoryyourgf 100K+
Name Historical past Any Quantity com.calldetails.smshistory.callhistoryofanyquantity 50K+
Name Historical past Any Quantity Element com.callhistory.anynumber.chapfvor.historical past 50K+
Name Historical past of Any Quantity com.callhistory.callhistoryany.name 50K+
Name Historical past Any Quantity Element com.identify.issue 50K+
Name Historical past Of Any Quantity com.getanynumberofcallhistory.callhistoryofanynumber.findcalldetailsofanynumber 50K+
Name Historical past Of Any Quantity com.chdev.callhistory 10K+
Telephone Name Historical past Tracker com.cellphone.name.historical past.tracker 10K+
Name Historical past- Any Quantity Deta com.pdf.maker.pdfreader.pdfscanner 10K+
Name Historical past Of Any Quantity com.any.numbers.calls.historical past 10K+
Name Historical past Any Quantity Element com.callapp.historyero 1K+
Name Historical past – Any Quantity Knowledge all.callhistory.element 500+
Name Historical past For Any Quantity com.easyranktools.callhistoryforanynumber 100+
Name Historical past of Numbers com.sbpinfotech.findlocationofanynumber 100+
Name Historical past of Any Quantity callhistoryeditor.callhistory.numberdetails.calleridlocator 50+
Name Historical past Professional com.all_historydownload.anynumber.callhistorybackup 50+

IoCs

A complete record of indicators of compromise (IoCs) and samples will be present in our GitHub repository.

Information

SHA-1 Filename Detection Description
799BB5127CA54239D3D4A14367DB3B712012CF14 all.callhistory.detail.apk Android/CallPhantom.Okay Android CallPhantom.
56A4FD71D1E4BBA2C5C240BE0D794DCFF709D9EB calldetaila.ndcallhisto.rytogetan.ynumber.apk Android/CallPhantom.M Android CallPhantom.
EC5E470753E76614CD28ECF6A3591F08770B7215 callhistoryeditor.callhistory.numberdetails.calleridlocator.apk Android/CallPhantom.F Android CallPhantom.
77C8B7BEC79E7D9AE0D0C02DEC4E9AC510429AD8 com.all_historydownload.anynumber.callhistorybackup.apk Android/CallPhantom.G Android CallPhantom.
9484EFD4C19969F57AFB0C21E6E1A4249C209305 com.any.numbers.names.historical past.apk Android/CallPhantom.L Android CallPhantom.
CE97CA7FEECDCAFC6B8E9BD83A370DFA5C336C0A com.anycallinformation.datadetailswho.callinfo.numberfinder.xapk Android/CallPhantom.B Android CallPhantom.
FC3BA2EDAC0BB9801F8535E36F0BCC49ADA5FA5A com.app.name.element.historical past.apk Android/CallPhantom.N Android CallPhantom.
B7B80FA34A41E3259E377C0D843643FF736803B8 com.basehistory.historydownloading.xapk Android/CallPhantom.O Android CallPhantom.
F0A8EBD7C4179636BE752ECCFC6BD9E4CD5C7F2C com.name.element.nameer.historical past.xapk Android/CallPhantom.C Android CallPhantom.
D021E7A0CF45EECC7EE8F57149138725DC77DC9A com.name.of.any.number.apk Android/CallPhantom.Q Android CallPhantom.
04D2221967FFC4312AFDC9B06A0B923BF3579E93 com.callapp.historyero.apk Android/CallPhantom.E Android CallPhantom.
CB31ED027FADBFA3BFFDBC8A84EE1A48A0B7C11D com.calldetails.smshistory.callhistoryofanynumber.apk Android/CallPhantom.Q Android CallPhantom.
C840A85B5FBAF1ED3E0F18A10A6520B337A94D4C com.callhistory.anynumber.chapfvor.history.xapk Android/CallPhantom.J Android CallPhantom.
BB6260CA856C37885BF9E952CA3D7E95398DDABF com.callhistory.nameparticulars.callerids.callerhistory.callhostoryanynumber.getcall.historical past.callhistorysupervisor.apk Android/CallPhantom.S Android CallPhantom.
55D46813047E98879901FD2416A23ACF8D8828F5 com.callhistory.namehistoryany.name.apk Android/CallPhantom.T Android CallPhantom.
E23D3905443CDBF4F1B9CA84A6FF250B6D89E093 com.callhistory.namehistoryyourgf.apk Android/CallPhantom.D Android CallPhantom.
89ECEC01CCB15FCDD2F64E07D0E876A9E79DD3CE com.callinformative.instantcallhistory.callhistorybluethem.callinfo.xapk Android/CallPhantom.B Android CallPhantom.
8EC557302145B40FE0898105752FFF5E357D7AC9 com.cddhaduk.callerid.block.contact.xapk Android/CallPhantom.U Android CallPhantom.
6F72FF58A67EF7AAA79CE2342012326C7B46429D com.easyranktools.callhistoryforanynumber.apk Android/CallPhantom.H Android CallPhantom.
28D3F36BD43D48F02C5058EDD1509E4488112154 com.getanynumberofcallhistory.callhistoryofanynumber.findcalldetailsofanynumber.xapk Android/CallPhantom.D Android CallPhantom.
47CEE9DED41B953A84FC9F6ED556EC3AF5BD9345 com.chdev.callhistory.xapk Android/CallPhantom.V Android CallPhantom.
9199A376B433F888AFE962C9BBD991622E8D39F9 com.identify.issue.apk Android/CallPhantom.P Android CallPhantom.
053A6A723FA2BFDA8A1B113E8A98DD04C6EEF72A com.pdf.maker.pdfreader.pdfscanner.apk Android/CallPhantom.W Android CallPhantom.
4B537A7152179BBA19D63C9EF287F1AC366AB5CB com.cellphone.name.history.tracker.apk Android/CallPhantom.I Android CallPhantom.
87F6B2DB155192692BAD1F26F6AEBB04DBF23AAD com.pixelxinnovation.supervisor.apk Android/CallPhantom.X Android CallPhantom.
583D0E7113795C7D68686D37CE7A41535CF56960 com.rajni.callhistory.apk Android/CallPhantom.Y Android CallPhantom.
45D04E06D8B329A01E680539D798DD3AE68904DA com.sbpinfotech.discoverlocationofanynumber.xapk Android/CallPhantom.A Android CallPhantom.
34393950A950F5651F3F7811B815B5A21F84A84B sc.name.ofany.cellelement.apk Android/CallPhantom.Z Android CallPhantom.

Community

IP Area Internet hosting supplier First seen Particulars
34.120.160[.]131

call-history-7cda4-default-rtdb.firebaseio[.]com

call-history-ecc1e-default-rtdb.firebaseio[.]com

Google LLC 2025‑05‑14 CallPhantom C&C server.
34.120.206[.]254

ch-ap-4-default-rtdb.firebaseio[.]com

chh1-ac0a3-default-rtdb.firebaseio[.]com

 

Google LLC 2025‑04‑17 CallPhantom C&C server.

MITRE ATT&CK methods

This desk was constructed utilizing model 18 of the MITRE ATT&CK framework.

Tactic ID Title Description
Command and Management T1437.001 Utility Layer Protocol: Net Protocols CallPhantom makes use of Firebase Cloud Messaging for C&C communication.
Impression T1643 Generate Visitors from Sufferer CallPhantom tries to attain fraudulent billing.

Tags: AndroidCallPhantomTricksUsers
Admin

Admin

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending.

Reconeyez Launches New Web site | SDM Journal

Reconeyez Launches New Web site | SDM Journal

May 15, 2025
Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

May 17, 2025
Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

May 18, 2025
Flip Your Toilet Right into a Good Oasis

Flip Your Toilet Right into a Good Oasis

May 15, 2025
Apollo joins the Works With House Assistant Program

Apollo joins the Works With House Assistant Program

May 17, 2025

TechTrendFeed

Welcome to TechTrendFeed, your go-to source for the latest news and insights from the world of technology. Our mission is to bring you the most relevant and up-to-date information on everything tech-related, from machine learning and artificial intelligence to cybersecurity, gaming, and the exciting world of smart home technology and IoT.

Categories

  • Cybersecurity
  • Gaming
  • Machine Learning
  • Smart Home & IoT
  • Software
  • Tech News

Recent News

How CallPhantom methods Android customers

How CallPhantom methods Android customers

May 8, 2026
5 gardening ideas utilizing Google instruments

5 gardening ideas utilizing Google instruments

May 8, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://techtrendfeed.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT

© 2025 https://techtrendfeed.com/ - All Rights Reserved