Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads
    Cybersecurity

    Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads

    adminBy adminMay 8, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananMay 08, 2026Android / Mobile Security

    Cybersecurity researchers have discovered fraudulent apps on the official Google Play Store for Android that falsely claimed to offer access to call histories for any phone number, only to trick users into joining a subscription that provided fake data and incurred financial loss.

    The 28 apps have collectively racked up more than 7.3 million downloads, with one of them alone accounting for over 3 million downloads, before they were taken down from the official app storefront.The activity, codenamed CallPhantom by Slovakian cybersecurity company ESET, primarily targeted Android users in India and the broader Asia-Pacific region.

    “The offending apps, which we named CallPhantom based on their false claims, purport to provide access to call histories, SMS records, and even WhatsApp call logs for any phone number,” ESET security researcher Lukáš Štefanko said in a report shared with The Hacker News. “To unlock this supposed feature, users are asked to pay — but all they get in return is randomly generated data.”

    The list of identified apps is below –

    • Call history : any number deta (calldetaila.ndcallhisto.rytogetan.ynumber)
    • Call History of Any Number (com.pixelxinnovation.manager)
    • Call Details of Any Number (com.app.call.detail.history)
    • Call History Any Number Detail (sc.call.ofany.mobiledetail)
    • Call History Any Number Detail (com.cddhaduk.callerid.block.contact)
    • Call History Of Any Number (com.basehistory.historydownloading)
    • Call History of Any Numbers (com.call.of.any.number)
    • Call History Of Any Number (com.rajni.callhistory)
    • Call History Any Number Detail (com.callhistory.calldetails.callerids.callerhistory.callhostoryanynumber.getcall.history.callhistorymanager)
    • Call History Any Number Detail (com.callinformative.instantcallhistory.callhistorybluethem.callinfo)
    • Call History Any Number detail (com.call.detail.caller.history)
    • Call History Any Number Detail (com.anycallinformation.datadetailswho.callinfo.numberfinder)
    • Call History Any Number Detail (com.callhistory.callhistoryyourgf)
    • Call History Any Number (com.calldetails.smshistory.callhistoryofanynumber)
    • Call History Any Number Detail  (com.callhistory.anynumber.chapfvor.history)
    • Call History of Any Number (com.callhistory.callhistoryany.call)
    • Call History Any Number Detail (com.name.factor)
    • Call History Of Any Number (com.getanynumberofcallhistory.callhistoryofanynumber.findcalldetailsofanynumber)
    • Call History Of Any Number (com.chdev.callhistory)
    • Phone Call History Tracker (com.phone.call.history.tracke)
    • Call History- Any Number Deta (com.pdf.maker.pdfreader.pdfscanner)
    • Call History Of Any Number (com.any.numbers.calls.history)
    • Call History Any Number Detail (com.callapp.historyero)
    • Call History – Any Number Data (all.callhistory.detail)
    • Call History For Any Number (com.easyranktools.callhistoryforanynumber)
    • Call History of Numbers (com.sbpinfotech.findlocationofanynumber)
    • Call History of Any Number (callhistoryeditor.callhistory.numberdetails.calleridlocator)
    • Call History Pro (com.all_historydownload.anynumber.callhistorybackup)

    At least one of the flagged apps was published under the developer name “Indian gov.in” in an attempt to build a false sense of trust and unsuspecting trick users into downloading it.

    However, this trick masks a nefarious motive where victims are asked to make a payment in order to view details of a phone number’s call and SMS history. Once the payment is made, users are served entirely fabricated phone numbers and names directly embedded into the source code. Evidence indicates that the activity may have been active since at least November 2025.

    A second cluster of these apps has been found to prompt users to enter their email address to which the purported details of any phone number would be delivered to. As in the prior case, no data is generated until a payment is made.

    The payments either rely on subscriptions via Google Play Store’s official billing system or via third-party apps that support Unified Payments Interface (UPI), an instant payment system widely used in India. Ironically, this list includes Google Pay, Walmart-backed PhonePe, and Paytm. A third method includes payment card checkout forms directly inside the apps. The last two approaches are in violation of Google’s policy.

    In at least one case, the apps implemented an additional trick to convince the user to make a payment. Should they exit the app without making any payment, it displays a deceptive notification claiming that a call history for a certain phone number had been successfully sent to their email address. Clicking on the notification directly takes the user to a subscription screen.

    The subscription plans vary across the app, ranging anywhere from about $6 to $80. Users who may have fallen prey to the scam should have had their subscriptions canceled after the apps were removed from the Google Play Store.

    What makes this activity notable is that the apps have a simple user interface and do not request any sensitive permissions. And to top it all, they do not even contain any functionality to retrieve call, SMS, or WhatsApp data.

    “Users who subscribed via official Google Play billing may be eligible for refunds under Google’s refund policies,” ESET said. “Purchases made via third‑party payment apps or through direct payment card entry cannot be refunded by Google, leaving users dependent on external payment providers or developers.”

    The disclosure comes as Group-IB said bad actors have stolen an estimated $2 million from Indonesian users as part of a fraud campaign that involved posing as the country’s tax platform, CoreTax, and other trusted brands. The campaign, which began in July 2025, has been linked to a financially motivated threat cluster called GoldFactory.

    “The attack chain integrates phishing websites, social engineering (WhatsApp), malicious APK sideloading, and voice phishing (vishing) to achieve full device compromise and unauthorized transfer execution,” Group-IB said.

    At a high level, these attacks involve using social engineering to distribute the fake apps via WhatsApp, which, when installed, deploy Android malware such as Gigabud RAT, MMRat, and Taotie that are capable of harvesting sensitive data and downloading additional components. The stolen information is then used to conduct account takeover attacks and financial theft.

    “The malware infrastructure supporting this fraud campaign is not limited to a single impersonated service. The same infrastructure has been observed actively abusing more than 16 trusted brands, collectively targeting Indonesia’s broader population of approximately 287 million,” Group-IB said.

    apps call Downloads Fake History Million Payments Play stole Store Users
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGoogle Ads surfaces Tag Manager controls inside its interface
    Next Article 58 Free June Marketing Ideas for Sizzlin’ Hot Campaigns
    admin
    • Website

    Related Posts

    How Denis Yurchak Built Yadaphone to $17,500 a Month and 20,000 Users in Just Over a Year After the Skype Shut Down

    May 20, 2026

    Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals

    May 20, 2026

    GitHub confirms breach of 3,800 repos via malicious VSCode extension

    May 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Mueller Explains Why Google Uses Markdown On Dev Docs

    May 21, 2026

    Google Marketing Live 2026: Everything you need to know

    May 21, 2026

    Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’

    May 21, 2026

    12 Awesome Custom Google Analytics Reports Created by the Experts

    May 20, 2026
    Categories
    • Blogging (82)
    • Cybersecurity (1,955)
    • Privacy & Online Earning (223)
    • SEO & Digital Marketing (1,214)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (306)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Mueller Explains Why Google Uses Markdown On Dev Docs

    May 21, 2026

    Google Marketing Live 2026: Everything you need to know

    May 21, 2026

    Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’

    May 21, 2026
    Most Popular
    • Mueller Explains Why Google Uses Markdown On Dev Docs
    • Google Marketing Live 2026: Everything you need to know
    • Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’
    • 12 Awesome Custom Google Analytics Reports Created by the Experts
    • Selector targets the network visibility gap in multi-cloud infrastructure
    • How to Persuade Your Boss to Send You to Ahrefs Evolve in San Diego
    • Key AEO & Content Trends for 2026
    • Google adds llms.txt check to Chrome Lighthouse
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.