{"id":14565,"date":"2026-05-08T08:29:16","date_gmt":"2026-05-08T08:29:16","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=14565"},"modified":"2026-05-08T08:29:17","modified_gmt":"2026-05-08T08:29:17","slug":"how-callphantom-methods-android-customers","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=14565","title":{"rendered":"How CallPhantom methods Android customers"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>There\u2019s an app for all the pieces these days\u2026 proper? Effectively, wanting up name data for a cellphone variety of selection is <em>not<\/em> a type of issues, as doubtlessly hundreds of thousands of Android customers came upon after paying for app subscriptions promising simply that.<\/p>\n<p>The offending apps, which we named CallPhantom primarily based on their false claims, purport to supply entry to name histories, SMS data, and even WhatsApp name logs for <em>any<\/em> cellphone quantity. To unlock this supposed characteristic, customers are requested to pay \u2013 however all they get in return is randomly generated information.<\/p>\n<p>Our investigation recognized 28 such fraudulent apps out there on the Google Play retailer, cumulatively downloaded greater than 7.3 million occasions. As an App Protection Alliance associate, we reported our findings to Google, which eliminated all the apps recognized on this report from Google Play.<\/p>\n<blockquote>\n<p><strong>Key factors of this blogpost:<\/strong><\/p>\n<ul>\n<li>A brand new Android rip-off, CallPhantom, falsely claims to supply entry to name logs, SMS data, and WhatsApp name historical past for any cellphone quantity in change for fee.<\/li>\n<li>We recognized and reported 28 CallPhantom apps on Google Play, cumulatively downloaded greater than 7.3 million occasions.<\/li>\n<li>Some CallPhantom apps sidestep Google Play\u2019s official billing system, complicating victims\u2019 refund efforts.<\/li>\n<\/ul>\n<\/blockquote>\n<h2>Investigation<\/h2>\n<p>In November 2025, we got here throughout a Reddit <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.reddit.com\/r\/IndiaTech\/comments\/1on69g4\/guys_look_what_i_found_on_playstore\">submit<\/a> discussing an app named Name Historical past of Any Quantity, discovered on Google Play. The app, proven in Determine 1, claims that it might probably retrieve the decision historical past of any cellphone quantity equipped by the person. It was revealed below the developer identify <span style=\"font-family: courier new, courier, monospace;\">Indian gov.in<\/span>, however the app has no actual affiliation with the Indian authorities.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 1. Call History of Any Number app on Google Play\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/callphantom\/figure-1.jpg\" alt=\"Figure 1. Call History of Any Number app on Google Play\" width=\"\" height=\"\"\/><figcaption><em>Determine 1. Name Historical past of Any Quantity app on Google Play<\/em><\/figcaption><\/figure>\n<p>Unsurprisingly, our evaluation confirmed that the \u201cname historical past\u201d information offered by this app is totally fabricated \u2013 the app generates random cellphone numbers and matches them with fastened names, name occasions, and name durations, which had been embedded instantly within the code, as proven in Determine\u00a02. This faux information is then offered to victims \u2013 however solely after fee.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 2. Hardcoded call log data used by the app\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/callphantom\/figure-2.png\" alt=\"Figure 2. Hardcoded call log data used by the app\" width=\"\" height=\"\"\/><figcaption><em>Determine 2. Hardcoded name log information utilized by the app<\/em><\/figcaption><\/figure>\n<p>A screenshot of the fabricated name historical past information was even included within the app\u2019s itemizing, offered as an illustration of the app\u2019s performance, as proven in Determine\u00a03.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 3. Screenshots from Google Play seemingly demonstrating the fraudulent app\u2019s functionality; the logs are randomly generated from hardcoded data\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/callphantom\/figure-3.jpg\" alt=\"Figure 3. Screenshots from Google Play\" width=\"\" height=\"\"\/><figcaption><em>Determine 3. Screenshots from Google Play seemingly demonstrating the fraudulent app\u2019s performance; the logs are randomly generated from hardcoded information<\/em><\/figcaption><\/figure>\n<p>Additional analysis revealed extra, associated apps out there on the Play Retailer \u2013 28 CallPhantom apps altogether. We reported the total set of fraudulent apps to Google on December 16<sup>th<\/sup>, 2025. On the time of publication, all of the reported apps have been faraway from the shop.<\/p>\n<p>Regardless of visible variations, which will be seen in Determine\u00a04 and Determine\u00a05, the aim of the apps is equivalent: generate faux communication information and cost victims for entry. The desk within the <em><a rel=\"nofollow\" target=\"_blank\" href=\"#Analyzed CallPhantom apps\">Analyzed CallPhantom apps<\/a> <\/em>part lists every app together with its key particulars, together with the obtain rely.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 4. Examples of CallPhantom apps found on the Play Store\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/callphantom\/figure-4.png\" alt=\"Figure 4. Examples of CallPhantom apps found on the Play Store\" width=\"\" height=\"\"\/><figcaption><em>Determine 4. Examples of CallPhantom apps discovered on the Play Retailer<\/em><\/figcaption><\/figure>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 5. Examples of CallPhantom initial screens\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/callphantom\/figure-5.jpg\" alt=\"Figure 5. Examples of CallPhantom initial screens\" width=\"\" height=\"\"\/><figcaption><em>Determine 5. Examples of CallPhantom preliminary screens<\/em><\/figcaption><\/figure>\n<h2>Marketing campaign overview<\/h2>\n<p>The CallPhantom apps we discovered on Google Play primarily focused Android customers in India and the broader Asia\u2011Pacific area. Lots of the apps got here with India\u2019s +91 nation code preselected and assist <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.digitalindia.gov.in\/initiative\/unified-payment-interface-upi\/\">UPI<\/a>, a fee system used primarily in India.<\/p>\n<p>The apps had garnered quite a few unfavorable critiques, with victims reporting that they had been scammed and by no means obtained the promised information, as will be seen in Determine\u00a06.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 6. Negative reviews for one of the fraudulent apps\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/callphantom\/figure-6.png\" alt=\"Figure 6. Negative reviews for one of the fraudulent apps\" width=\"\" height=\"\"\/><figcaption><em>Determine 6. Unfavourable critiques for one of many fraudulent apps<\/em><\/figcaption><\/figure>\n<p>It&#8217;s not clear how the apps had been distributed or promoted. Presumably, by seemingly providing perception into personal data, the scammers efficiently took benefit of individuals\u2019s curiosity. Mixed with a couple of glowing (faux) critiques, it may need appeared like an intriguing supply.<\/p>\n<h2>CallPhantom overview<\/h2>\n<p>In our investigation, we recognized two fundamental clusters of those fraudulent apps.<\/p>\n<p>The apps within the <strong>first cluster<\/strong> comprise hardcoded names, nation codes, and templates of their code, as proven in Determine\u00a07. These are mixed with randomly generated cellphone numbers and proven to the person as partial \u201coutcomes\u201d. To view the total (faux) historical past, the sufferer has to pay.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 7. Code responsible for generating messages\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/callphantom\/figure-7.png\" alt=\"Figure 7. Code responsible for generating messages\" width=\"\" height=\"\"\/><figcaption><em>Determine 7. Code answerable for producing messages<\/em><\/figcaption><\/figure>\n<p>The apps within the <strong>second cluster<\/strong> ask customers to enter an e-mail deal with the place the \u201cretrieved\u201d name historical past would supposedly be delivered, as seen within the screenshots in Determine\u00a08. No information era happens till after fee; customers must pay or subscribe earlier than any e-mail would supposedly be despatched.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 8. CallPhantom requests the user\u2019s email address where call logs would supposedly be delivered\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/callphantom\/figure-8.jpg\" alt=\"Figure 8. CallPhantom requests the user\u2019s email address\" width=\"\" height=\"\"\/><figcaption><em>Determine 8. CallPhantom requests the person\u2019s e-mail deal with the place name logs would supposedly be delivered<\/em><\/figcaption><\/figure>\n<p>Usually, CallPhantom apps have a easy person interface and don&#8217;t request any intrusive or delicate permissions \u2013 they don\u2019t must. Coincidentally, they don&#8217;t comprise any performance able to retrieving actual name, SMS, or WhatsApp information.<\/p>\n<p>Within the CallPhantom apps we analyzed, we noticed three totally different fee strategies used, the latter two of that are in violation of Google Play\u2019s <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/support.google.com\/googleplay\/android-developer\/answer\/10281818?hl=en\" target=\"_blank\" rel=\"noopener\">funds coverage<\/a>.<\/p>\n<p>First, a few of the apps relied on subscriptions through Google Play\u2019s official billing system. That is required of apps providing in-app purchases, per Google Play\u2019s funds coverage; such purchases are lined by Google\u2019s <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/support.google.com\/googleplay\/answer\/15574897?hl=en\" target=\"_blank\" rel=\"noopener\">refund safety<\/a>.<\/p>\n<p>Second, a few of the apps relied on funds through third-party apps that assist UPI. For these third-party fee apps, CallPhantom apps both included hardcoded URLs or fetched the URLs dynamically from a Firebase realtime database, that means the fee account might be modified at any time by the operator.<\/p>\n<p>Third, in some instances, fee card checkout types had been included instantly within the CallPhantom apps.<\/p>\n<p>Examples of the fee strategies will be seen in Determine\u00a09.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 9. Various payment options used by CallPhantom apps\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/callphantom\/figure-9.jpg\" alt=\"Figure 9. Various payment options used by CallPhantom apps\" width=\"\" height=\"\"\/><figcaption><em>Determine 9. Varied fee choices utilized by CallPhantom apps<\/em><\/figcaption><\/figure>\n<p>In a single case, we noticed an extra tactic used to coax the person into paying: if the person exited the app with out fee, the app displayed misleading alerts styled as new emails claiming that the decision historical past outcomes had arrived \u2013 see Determine\u00a010. Clicking the notification led straight to a subscription display screen.<\/p>\n<figure class=\"image\"><img decoding=\"async\" style=\"width: 60%; margin: 0 auto; display: block;\" title=\"Figure 10. Deceptive notification displayed by CallPhantom to persuade users to subscribe\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/callphantom\/figure-10.png\" alt=\"Figure 10. Deceptive notification displayed by CallPhantom to persuade users to subscribe\" width=\"\" height=\"\"\/><figcaption><em>Determine 10. Misleading notification displayed by CallPhantom to influence customers to subscribe<\/em><\/figcaption><\/figure>\n<p>The charges requested for the faux service differ broadly throughout the apps. The apps additionally seem to supply totally different subscription packages, reminiscent of weekly, month-to-month, or yearly providers, with the best requested worth sitting at US$80. For the bottom \u201csubscription tier\u201d, the common requested worth was \u20ac5.<\/p>\n<h2>What to do you probably have been scammed<\/h2>\n<p>Usually, subscriptions bought by the official Google Play billing system will be canceled within the Play Retailer app by tapping your profile icon, navigating to Funds &amp; subscriptions \u2192 Subscriptions, choosing the lively subscription, and tapping Cancel subscription. Google explains the total course of on its <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/support.google.com\/googleplay\/answer\/7018481\" target=\"_blank\" rel=\"noopener\">Cancel, pause, or change a subscription on Google Play<\/a> web page.<\/p>\n<p>For the 28 apps described on this blogpost, present subscriptions have been canceled when the apps had been faraway from Google Play.<\/p>\n<p>In some instances, refunds for Google Play purchases are doable. Google might concern a refund relying on the time since buy, the kind of merchandise, and its refund coverage. Usually, requests have to be made inside the allowed refund window as described on Google\u2019s <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/support.google.com\/googleplay\/answer\/15574897?hl=en\" target=\"_blank\" rel=\"noopener\">assist web page<\/a>.<\/p>\n<p>If the acquisition was made exterior Google Play \u2013 for instance, by coming into fee card particulars contained in the app or by paying by third\u2011celebration providers \u2013 then Google can&#8217;t cancel the subscription or concern a refund, and customers must contact the fee supplier or the app developer instantly.<\/p>\n<h2>Conclusion<\/h2>\n<p>We recognized a brand new cluster of fraudulent Android apps on Google Play that collectively amassed over 7.3 million downloads earlier than being taken down upon notification by ESET. These apps, which we collectively named CallPhantom, falsely promise to retrieve name logs, SMS data, and WhatsApp name historical past for any cellphone quantity, a technically unimaginable declare designed solely to use individuals\u2019s curiosity and mislead them into paying.<\/p>\n<p>Lots of the apps circumvented Google Play\u2019s official billing system, pushing customers towards third\u2011celebration funds or direct card entry, complicating refund efforts and exposing victims to monetary threat.<\/p>\n<p>Our evaluation revealed that the \u201coutcomes\u201d proven to victims are totally fabricated, usually utilizing hardcoded Indian numbers, predefined names, and generated timestamps disguised as actual communication information.<\/p>\n<p>Customers who subscribed through official Google Play billing could also be eligible for refunds below Google\u2019s refund insurance policies. Purchases made through third\u2011celebration fee apps or by direct fee card entry can&#8217;t be refunded by Google, leaving customers depending on exterior fee suppliers or builders.<\/p>\n<blockquote>\n<div><em>For any inquiries about our analysis revealed on WeLiveSecurity, please contact us at <a rel=\"nofollow\" target=\"_blank\" style=\"background-color: #f4f4f4;\" href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/mailto:threatintel@eset.com?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=eset-research&amp;utm_term=en\">threatintel@eset.com<\/a>.\u00a0<\/em><\/div>\n<div><em>ESET Analysis gives personal APT intelligence studies and information feeds. For any inquiries about this service, go to the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/int\/business\/services\/threat-intelligence\/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=wls-research&amp;utm_content=fake-call-logs-real-payments-how-callphantom-tricks-android-users&amp;sfdccampaignid=7011n0000017htTAAQ\" target=\"_blank\" rel=\"noopener\">ESET Menace Intelligence<\/a> web page.<\/em><\/div>\n<\/blockquote>\n<h2>Analyzed CallPhantom apps<a rel=\"nofollow\" target=\"_blank\" id=\"Analyzed CallPhantom apps\"\/><\/h2>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"187\"><strong>App identify<\/strong><\/td>\n<td width=\"360\"><strong>Package deal identify<\/strong><\/td>\n<td width=\"93\"><strong>Variety of downloads<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"187\">Name historical past : any quantity deta<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">calldetaila.ndcallhisto.rytogetan.ynumber<\/span><\/td>\n<td width=\"93\">3M+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past of Any Quantity<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.pixelxinnovation.supervisor<\/span><\/td>\n<td width=\"93\">1M+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Particulars of Any Quantity<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.app.name.element.historical past<\/span><\/td>\n<td width=\"93\">1M+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Any Quantity Element<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">sc.name.ofany.mobiledetail<\/span><\/td>\n<td width=\"93\">500K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Any Quantity Element<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.cddhaduk.callerid.block.contact<\/span><\/td>\n<td width=\"93\">500K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Of Any Quantity<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.basehistory.historydownloading<\/span><\/td>\n<td width=\"93\">500K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past of Any Numbers<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.name.of.any.quantity<\/span><\/td>\n<td width=\"93\">100K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Of Any Quantity<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.rajni.callhistory<\/span><\/td>\n<td width=\"93\">100K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Any Quantity Element<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.callhistory.calldetails.callerids.calle<wbr\/>rhistory.callhostoryanynumber.getcall.histo<wbr\/>ry.callhistorymanager<\/span><\/td>\n<td width=\"93\">100K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Any Quantity Element<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.callinformative.instantcall<wbr\/>historical past.callhistorybluethem.callinfo<\/span><\/td>\n<td width=\"93\">100K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Any Quantity element<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.name.element.caller.historical past<\/span><\/td>\n<td width=\"93\">100K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Any Quantity Element<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.anycallinformation.datadetailswho.calli<wbr\/>nfo.numberfinder<\/span><\/td>\n<td width=\"93\">100K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Any Quantity Element<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.callhistory.callhistoryyourgf<\/span><\/td>\n<td width=\"93\">100K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Any Quantity<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.calldetails.smshistory.callhistoryofany<wbr\/>quantity<\/span><\/td>\n<td width=\"93\">50K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Any Quantity Element<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.callhistory.anynumber.chapfvor.historical past<\/span><\/td>\n<td width=\"93\">50K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past of Any Quantity<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.callhistory.callhistoryany.name<\/span><\/td>\n<td width=\"93\">50K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Any Quantity Element<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.identify.issue<\/span><\/td>\n<td width=\"93\">50K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Of Any Quantity<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.getanynumberofcallhistory.callhistoryof<wbr\/>anynumber.findcalldetailsofanynumber<\/span><\/td>\n<td width=\"93\">50K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Of Any Quantity<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.chdev.callhistory<\/span><\/td>\n<td width=\"93\">10K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Telephone Name Historical past Tracker<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.cellphone.name.historical past.tracker<\/span><\/td>\n<td width=\"93\">10K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past- Any Quantity Deta<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.pdf.maker.pdfreader.pdfscanner<\/span><\/td>\n<td width=\"93\">10K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Of Any Quantity<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.any.numbers.calls.historical past<\/span><\/td>\n<td width=\"93\">10K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Any Quantity Element<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.callapp.historyero<\/span><\/td>\n<td width=\"93\">1K+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past &#8211; Any Quantity Knowledge<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">all.callhistory.element<\/span><\/td>\n<td width=\"93\">500+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past For Any Quantity<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.easyranktools.callhistoryforanynumber<\/span><\/td>\n<td width=\"93\">100+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past of Numbers<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.sbpinfotech.findlocationofanynumber<\/span><\/td>\n<td width=\"93\">100+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past of Any Quantity<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">callhistoryeditor.callhistory.numberdetails<wbr\/>.calleridlocator<\/span><\/td>\n<td width=\"93\">50+<\/td>\n<\/tr>\n<tr>\n<td width=\"187\">Name Historical past Professional<\/td>\n<td width=\"360\"><span style=\"font-family: courier new, courier, monospace;\">com.all_historydownload.anynumber.callhisto<wbr\/>rybackup<\/span><\/td>\n<td width=\"93\">50+<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>IoCs<\/h2>\n<p>A complete record of indicators of compromise (IoCs) and samples will be present in <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/eset\/malware-ioc\/tree\/master\/callphantom\" target=\"_blank\" rel=\"noopener\">our GitHub repository<\/a>.<\/p>\n<h3>Information<\/h3>\n<h3><span style=\"font-size: medium; font-weight: 400;\"><\/p>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"161\"><strong>SHA-1<\/strong><\/td>\n<td width=\"161\"><strong>Filename<\/strong><\/td>\n<td width=\"161\"><strong>Detection<\/strong><\/td>\n<td width=\"161\"><strong>Description<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">799BB5127CA54239D3D4<wbr\/>A14367DB3B712012CF14<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">all.callhistory.deta<wbr\/>il.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.Okay<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">56A4FD71D1E4BBA2C5C2<wbr\/>40BE0D794DCFF709D9EB<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">calldetaila.ndcallhi<wbr\/>sto.rytogetan.ynumbe<wbr\/>r.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.M<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">EC5E470753E76614CD28<wbr\/>ECF6A3591F08770B7215<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">callhistoryeditor.ca<wbr\/>llhistory.numberdeta<wbr\/>ils.calleridlocator.<wbr\/>apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.F<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">77C8B7BEC79E7D9AE0D0<wbr\/>C02DEC4E9AC510429AD8<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.all_historydownl<wbr\/>oad.anynumber.callhi<wbr\/>storybackup.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.G<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">9484EFD4C19969F57AFB<wbr\/>0C21E6E1A4249C209305<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.any.numbers.name<wbr\/>s.historical past.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.L<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">CE97CA7FEECDCAFC6B8E<wbr\/>9BD83A370DFA5C336C0A<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.anycallinformati<wbr\/>on.datadetailswho.ca<wbr\/>llinfo.numberfinder.<wbr\/>xapk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.B<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">FC3BA2EDAC0BB9801F85<wbr\/>35E36F0BCC49ADA5FA5A<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.app.name.element.<wbr\/>historical past.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.N<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">B7B80FA34A41E3259E37<wbr\/>7C0D843643FF736803B8<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.basehistory.hist<wbr\/>orydownloading.xapk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.O<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">F0A8EBD7C4179636BE75<wbr\/>2ECCFC6BD9E4CD5C7F2C<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.name.element.name<wbr\/>er.historical past.xapk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.C<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">D021E7A0CF45EECC7EE8<wbr\/>F57149138725DC77DC9A<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.name.of.any.numb<wbr\/>er.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.Q<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">04D2221967FFC4312AFD<wbr\/>C9B06A0B923BF3579E93<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.callapp.historye<wbr\/>ro.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.E<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">CB31ED027FADBFA3BFFD<wbr\/>BC8A84EE1A48A0B7C11D<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.calldetails.smsh<wbr\/>istory.callhistoryof<wbr\/>anynumber.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.Q<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">C840A85B5FBAF1ED3E0F<wbr\/>18A10A6520B337A94D4C<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.callhistory.anyn<wbr\/>umber.chapfvor.histo<wbr\/>ry.xapk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.J<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">BB6260CA856C37885BF9<wbr\/>E952CA3D7E95398DDABF<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.callhistory.name<wbr\/>particulars.callerids.ca<wbr\/>llerhistory.callhost<wbr\/>oryanynumber.getcall<wbr\/>.historical past.callhistory<wbr\/>supervisor.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.S<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">55D46813047E98879901<wbr\/>FD2416A23ACF8D8828F5<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.callhistory.name<wbr\/>historyany.name.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.T<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">E23D3905443CDBF4F1B9<wbr\/>CA84A6FF250B6D89E093<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.callhistory.name<wbr\/>historyyourgf.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.D<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">89ECEC01CCB15FCDD2F6<wbr\/>4E07D0E876A9E79DD3CE<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.callinformative.<wbr\/>instantcallhistory.c<wbr\/>allhistorybluethem.c<wbr\/>allinfo.xapk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.B<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">8EC557302145B40FE089<wbr\/>8105752FFF5E357D7AC9<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.cddhaduk.calleri<wbr\/>d.block.contact.xapk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.U<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">6F72FF58A67EF7AAA79C<wbr\/>E2342012326C7B46429D<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.easyranktools.ca<wbr\/>llhistoryforanynumbe<wbr\/>r.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.H<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">28D3F36BD43D48F02C50<wbr\/>58EDD1509E4488112154<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.getanynumberofca<wbr\/>llhistory.callhistor<wbr\/>yofanynumber.findcal<wbr\/>ldetailsofanynumber.<wbr\/>xapk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.D<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">47CEE9DED41B953A84FC<wbr\/>9F6ED556EC3AF5BD9345<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.chdev.callhistor<wbr\/>y.xapk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.V<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">9199A376B433F888AFE9<wbr\/>62C9BBD991622E8D39F9<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.identify.issue.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.P<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">053A6A723FA2BFDA8A1B<wbr\/>113E8A98DD04C6EEF72A<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.pdf.maker.pdfrea<wbr\/>der.pdfscanner.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.W<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">4B537A7152179BBA19D6<wbr\/>3C9EF287F1AC366AB5CB<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.cellphone.name.histo<wbr\/>ry.tracker.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.I<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">87F6B2DB155192692BAD<wbr\/>1F26F6AEBB04DBF23AAD<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.pixelxinnovation<wbr\/>.supervisor.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.X<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">583D0E7113795C7D6868<wbr\/>6D37CE7A41535CF56960<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.rajni.callhistor<wbr\/>y.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.Y<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">45D04E06D8B329A01E68<wbr\/>0539D798DD3AE68904DA<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">com.sbpinfotech.discover<wbr\/>locationofanynumber.<wbr\/>xapk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.A<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">34393950A950F5651F3F<wbr\/>7811B815B5A21F84A84B<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">sc.name.ofany.cell<wbr\/>element.apk<\/span><\/td>\n<td width=\"161\">Android\/CallPhantom.Z<\/td>\n<td width=\"161\">Android CallPhantom.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/span><\/h3>\n<h3>Community<\/h3>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"167\"><strong>IP<\/strong><\/td>\n<td width=\"227\"><strong>Area<\/strong><\/td>\n<td width=\"129\"><strong>Internet hosting supplier<\/strong><\/td>\n<td width=\"107\"><strong>First seen<\/strong><\/td>\n<td width=\"107\"><strong>Particulars<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"167\"><span style=\"font-family: courier new, courier, monospace;\">34.120.160[.]131<\/span><\/td>\n<td width=\"227\">\n<p><span style=\"font-family: courier new, courier, monospace;\">call-history-7cda4-defau<wbr\/>lt-rtdb.firebaseio[.]com<\/span><\/p>\n<p><span style=\"font-family: courier new, courier, monospace;\">call-history-ecc1e-defau<wbr\/>lt-rtdb.firebaseio[.]com<\/span><\/p>\n<\/td>\n<td width=\"129\">Google LLC<\/td>\n<td width=\"107\">2025\u201105\u201114<\/td>\n<td width=\"107\">CallPhantom C&amp;C server.<\/td>\n<\/tr>\n<tr>\n<td width=\"167\"><span style=\"font-family: courier new, courier, monospace;\">34.120.206[.]254<\/span><\/td>\n<td width=\"227\">\n<p><span style=\"font-family: courier new, courier, monospace;\">ch-ap-4-default-rtdb.fir<wbr\/>ebaseio[.]com<\/span><\/p>\n<p><span style=\"font-family: courier new, courier, monospace;\">chh1-ac0a3-default-rtdb.<wbr\/>firebaseio[.]com<\/span><\/p>\n<p>\u00a0<\/p>\n<\/td>\n<td width=\"129\">Google LLC<\/td>\n<td width=\"107\">2025\u201104\u201117<\/td>\n<td width=\"107\">CallPhantom C&amp;C server.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>MITRE ATT&amp;CK methods<\/h2>\n<p>This desk was constructed utilizing <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/resources\/versions\/\">model 18<\/a> of the MITRE ATT&amp;CK framework.<\/p>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"113\"><strong>Tactic<\/strong><\/td>\n<td width=\"113\"><strong>ID<\/strong><\/td>\n<td width=\"151\"><strong>Title<\/strong><\/td>\n<td width=\"265\"><strong>Description<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"113\"><strong>Command and Management<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1437\/001\">T1437.001<\/a><\/td>\n<td width=\"151\">Utility Layer Protocol: Net Protocols<\/td>\n<td width=\"265\">CallPhantom makes use of Firebase Cloud Messaging for C&amp;C communication.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><strong>Impression<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1643\">T1643<\/a><\/td>\n<td width=\"151\">Generate Visitors from Sufferer<\/td>\n<td width=\"265\">CallPhantom tries to attain fraudulent billing.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/int\/business\/services\/threat-intelligence\/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=wls-research&amp;utm_content=fake-call-logs-real-payments-how-callphantom-tricks-android-users&amp;sfdccampaignid=7011n0000017htTAAQ\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/eti-eset-threat-intelligence.png\" alt=\"\" width=\"915\" height=\"296\"\/><\/a><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s an app for all the pieces these days\u2026 proper? Effectively, wanting up name data for a cellphone variety of selection is not a type of issues, as doubtlessly hundreds of thousands of Android customers came upon after paying for app subscriptions promising simply that. The offending apps, which we named CallPhantom primarily based on [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":14567,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[797,8998,4128,342],"class_list":["post-14565","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-android","tag-callphantom","tag-tricks","tag-users"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14565"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14565\/revisions"}],"predecessor-version":[{"id":14566,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14565\/revisions\/14566"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/14567"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-08 10:40:53 UTC -->