Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Use Fake Claude AI Installers to Infect Systems
May 7, 2026
UAT-8302 Uses Custom Malware and Open-Source Tools to Steal Data
May 7, 2026
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Home/Threats/Fake Call History Apps on Google Play Steal Payments
Threats

Fake Call History Apps on Google Play Steal Payments

A recent wave of fraudulent Android applications accumulated millions of downloads on Google Play before their eventual removal. These apps, now tracked under the name CallPhantom, enticed users with...

Marcus Rodriguez
Marcus Rodriguez
May 7, 2026 4 Min Read
1 0

A recent wave of fraudulent Android applications accumulated millions of downloads on Google Play before their eventual removal. These apps, now tracked under the name CallPhantom, enticed users with the promise of revealing any phone number’s call history. However, they delivered only fabricated data and caused users significant financial losses, as detailed in a recent report.

The scheme worked by exploiting a simple but powerful hook. People are naturally curious about who has called a specific number, and these apps claimed to deliver that information instantly.

Users were shown what looked like partial results and then prompted to pay to unlock the full call history. That history was entirely fabricated right from the start.

Researchers at WeLiveSecurity identified and reported 28 such fraudulent applications on the Google Play Store.

Their analysis found the apps had been cumulatively downloaded over 7.3 million times before Google removed them following ESET’s disclosure in December 2025.

The apps primarily targeted Android users in India and the broader Asia-Pacific region. Many came with India’s country code pre-selected and supported UPI, a payment system widely used across India. A screenshot of the fabricated call history data was even included in the app’s Play Store listing, presented as proof the app actually worked.

Fake Call History Apps on Google Play

Despite looking different on the surface, all 28 apps shared the same core purpose: generate fake communication data and charge victims for access. Subscription packages ranged from weekly to yearly, with the highest price reaching up to $80.

The CallPhantom apps fell into two main clusters. The first group had hardcoded names, country codes, and call log templates embedded directly in their code. These were combined with randomly generated phone numbers and shown to users as partial results, pushing them to pay to see more.

The second cluster asked users to enter an email address, claiming the retrieved call history would be delivered there. No data was generated until after payment, and even then, nothing real was ever sent. The apps had no actual capability to access call logs, SMS records, or WhatsApp data from any device.

Hardcoded call log data used by the app (Source - Welivesecurity)
Hardcoded call log data used by the app (Source – Welivesecurity)

This shows how deeply the deception was built into the code, with fixed names and timestamps baked in before the app ever reached a user’s phone.

Three payment methods appeared across the apps. Some used Google Play’s official billing system. Others redirected users to third-party UPI apps, with payment details either hardcoded or fetched dynamically from a Firebase real-time database, letting operators swap receiving accounts at will.

A third method embedded payment card checkout forms directly inside the app, violating Google Play’s payments policy and making refunds significantly harder.

Bypassing Refunds and Staying Under the Radar

One of the most deliberate tactics used by CallPhantom was steering users toward payment channels Google could not reverse. When payments went through third-party UPI apps or direct card entry inside the app, Google had no ability to cancel transactions or issue refunds. Victims were left fully dependent on external payment providers or the scam developers themselves.

Google Play seemingly demonstrating the fraudulent app’s functionality (Source - Welivesecurity)
Google Play seemingly demonstrating the fraudulent app’s functionality (Source – Welivesecurity)

In at least one case, the app sent deceptive notifications styled as email alerts, falsely claiming call history results had arrived. Tapping the notification led straight to a subscription screen, keeping the pressure on even after users had exited without paying.

Anyone who subscribed through Google Play’s official billing system may be eligible for a refund, as existing subscriptions were canceled when the apps were removed. Requests must fall within Google’s allowed refund window. For purchases made outside Google Play, contacting the payment provider or card issuer directly to dispute the charge is the recommended step.

The most practical protection is verification before downloading. Checking developer credibility, reading user reviews carefully, and staying skeptical of apps claiming to access private data belonging to other people are all steps that help avoid traps like these.

Indicators of Compromise (IoCs):-

Type Indicator Description
SHA-1 Hash 799AA5127CA54239D3D4A14367DB3B712012CF14 all.callhistory.detail.apk — Android/CallPhantom
SHA-1 Hash 56A4FD71D1E4BBA2C5C240BE0D794DCFF709D9EB calldetaila.ndcallhisto.rytogetan.ynumber.apk — Android/CallPhantom
SHA-1 Hash EC5E470753E76614CD28ECF6A3591F08770B7215 callhistoryeditor.callhistory.numberdetails.calleridlocator.apk — Android/CallPhantom
SHA-1 Hash 77C8B7BEC79E7D9AE0D0C02DEC4E9AC510429AD8 com.all_historydownload.anynumber.callhistorybackup.apk — Android/CallPhantom
SHA-1 Hash 9484EFD4C19969F57AFB0C21E6E1A4249C209305 com.any.numbers.calls.history.apk — Android/CallPhantom
SHA-1 Hash CE97CA7FEECDCAFC6B8E9BD83A370DFA5C336C0A com.anycallinformation.datadetailswho.callinfo.numberfinder.xapk — Android/CallPhantom
SHA-1 Hash FC3BA2EDAC0BB9801F8535E36F0BCC49ADA5FA5A com.app.call.detail.history.apk — Android/CallPhantom
SHA-1 Hash B7B80FA34A41E3259E377C0D843643FF736803B8 com.basehistory.historydownloading.xapk — Android/CallPhantom
SHA-1 Hash F0A8EBD7C4179636BE752ECCFC6BD9E4CD5C7F2C com.call.detail.caller.history.xapk — Android/CallPhantom
SHA-1 Hash D021E7A0CF45EECC7EE8F57149138725DC77DC9A com.call.of.any.number.apk — Android/CallPhantom
SHA-1 Hash 04D2221967FFC4312AFDC9B06A0B923BF3579E93 com.callapp.historyero.apk — Android/CallPhantom
SHA-1 Hash CB31ED027FADBFA3BFFDBC8A84EE1A48A0B7C11D com.calldetails.smshistory.callhistoryofanynumber.apk — Android/CallPhantom
SHA-1 Hash C840A85B5FBAF1ED3E0F18A10A6520B337A94D4C com.callhistory.anynumber.chapfvor.history.xapk — Android/CallPhantom
SHA-1 Hash BB6260CA856C37885BF9E952CA3D7E95398DDABF com.callhistory.calldetails.callerids…callhistorymanager.apk — Android/CallPhantom
SHA-1 Hash 55D46813047E98879901FD2416A23ACF8D8828F5 com.callhistory.callhistoryany.call.apk — Android/CallPhantom
SHA-1 Hash E23D3905443CDBF4F1B9CA84A6FF250B6D89E093 com.callhistory.callhistoryyourgf.apk — Android/CallPhantom
SHA-1 Hash 89ECEC01CCB15FCDD2F64E07D0E876A9E79DD3CE com.callinformative.instantcallhistory…callinfo.xapk — Android/CallPhantom
SHA-1 Hash 8EC557302145B40FE0898105752FFF5E357D7AC9 com.cddhaduk.callerid.block.contact.xapk — Android/CallPhantom
SHA-1 Hash 6F72FF58A67EF7AAA79CE2342012326C7B46429D com.easyranktools.callhistoryforanynumber.apk — Android/CallPhantom
SHA-1 Hash 28D3F36BD43D48F02C5058EDD1509E4488112154 com.getanynumberofcallhistory…findcalldetailsofanynumber.xapk — Android/CallPhantom
SHA-1 Hash 47CEE9DED41B953A84FC9F6ED556EC3AF5BD9345 com.chdev.callhistory.xapk — Android/CallPhantom
SHA-1 Hash 9199A376B433F888AFE962C9BBD991622E8D39F9 com.name.factor.apk — Android/CallPhantom
SHA-1 Hash 053A6A723FA2BFDA8A1B113E8A98DD04C6EEF72A com.pdf.maker.pdfreader.pdfscanner.apk — Android/CallPhantom
SHA-1 Hash 4B537A7152179BBA19D63C9EF287F1AC366AB5CB com.phone.call.history.tracker.apk — Android/CallPhantom
SHA-1 Hash 87F6B2DB155192692BAD1F26F6AEBB04DBF23AAD com.pixelxinnovation.manager.apk — Android/CallPhantom
SHA-1 Hash 583D0E7113795C7D68686D37CE7A41535CF56960 com.rajni.callhistory.apk — Android/CallPhantom
SHA-1 Hash 45D04E06D8B329A01E680539D798DD3AE68904DA com.sbpinfotech.findlocationofanynumber.xapk — Android/CallPhantom
SHA-1 Hash 34393950A950F5651F3F7811B815B5A21F84A84B sc.call.ofany.mobiledetail.apk — Android/CallPhantom
IP Address 34.120.160[.]131 Firebase-hosted C2 IP, Google LLC, first seen 2025
IP Address 34.120.206[.]254 Firebase-hosted C2 IP, Google LLC, first seen 2025
Domain call-history-7cda4-default-rtdb.firebaseio[.]com Firebase real-time database used for C2 communication
Domain call-history-ecc1e-default-rtdb.firebaseio[.]com Firebase real-time database used for C2 communication
Domain ch-ap-4-default-rtdb.firebaseio[.]com Firebase real-time database used for payment URL delivery
Domain chh1-ac0a3-default-rtdb.firebaseio[.]com Firebase real-time database used for payment URL delivery

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

ExploitSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Malicious NuGet Packages Steal Credentials, SSH Target Browser

Next Post

Hackers Abuse Google Ads to Steal GoDaddy Manage Users ManageWP

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
WatchGuard Agent Flaws Grant Full SYSTEM Privileges on
May 7, 2026
Hackers Abuse Google Ads to Steal GoDaddy Manage Users ManageWP
May 7, 2026
Fake Call History Apps on Google Play Steal Payments
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us