Fake call logs, real payments: How CallPhantom tricks Android users
ESET researchers discovered a cluster of 28 fraudulent Android applications, dubbed CallPhantom, that accumulated over 7.3 million downloads on Google Play. These apps deceive users by falsely claiming to retrieve call and message logs for arbitrary phone numbers, instead presenting hardcoded, randomly generated data to extort subscription payments via Google Play billing, UPI, or direct card entry.
Authors: ESET Research
Source:ESET
- domaincall-history-7cda4-default-rtdb[.]firebaseio[.]comFirebase C&C domain used by CallPhantom
- domaincall-history-ecc1e-default-rtdb[.]firebaseio[.]comFirebase C&C domain used by CallPhantom
- domainch-ap-4-default-rtdb[.]firebaseio[.]comFirebase C&C domain used by CallPhantom
- domainchh1-ac0a3-default-rtdb[.]firebaseio[.]comFirebase C&C domain used by CallPhantom
- ip34[.]120[.]160[.]131CallPhantom C&C server
- ip34[.]120[.]206[.]254CallPhantom C&C server
- sha156A4FD71D1E4BBA2C5C240BE0D794DCFF709D9EBMalicious APK (calldetaila.ndcallhisto.rytogetan.ynumber) with 3M+ downloads
- sha1799bb5127ca54239d3d4a14367db3b712012cf14Malicious APK (all.callhistory.detail)
- sha187f6b2db155192692bad1f26f6aebb04dbf23aadMalicious APK (com.pixelxinnovation.manager) with 1M+ downloads
- sha1fc3ba2edac0bb9801f8535e36f0bcc49ada5fa5aMalicious APK (com.app.call.detail.history) with 1M+ downloads
Detection / HunterGoogle
What Happened
Security researchers found 28 scam apps on the Google Play Store that were downloaded over 7.3 million times. These apps, targeting mostly Android users in India and the Asia-Pacific region, falsely promised to show the call and message history of any phone number. In reality, they just made up fake data to trick people into paying for expensive subscriptions. Google has since removed these apps from the store. Users who downloaded them should cancel any associated subscriptions and request refunds through Google Play or their payment provider.
Key Takeaways
- ESET identified 28 fraudulent Android apps dubbed CallPhantom on Google Play with over 7.3 million downloads.
- The apps falsely claim to retrieve call, SMS, and WhatsApp logs for any number, instead generating fake data using hardcoded templates.
- Scammers monetize the apps via subscriptions, third-party UPI payments, and direct credit card forms, often bypassing Google Play's billing policies.
- Deceptive tactics include fake email notifications to trick users into paying for the fabricated data.
Affected Systems
- Android OS
- Google Play Store users (primarily in India and Asia-Pacific)
Attack Chain
Users download the CallPhantom app from the Google Play Store, lured by false promises of viewing call and message logs for any number. Upon launching, the app either displays a fabricated preview of call logs using hardcoded names and random numbers, or prompts the user for an email address. To view the full logs or receive the email, the user is forced to pay a subscription fee via Google Play billing, a third-party UPI link fetched from a Firebase C2, or a direct credit card form. If the user attempts to exit without paying, the app displays deceptive notifications mimicking email alerts to coax them back into the payment flow.
Detection Availability
- YARA Rules: No
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: No
The article does not provide specific detection rules, but lists file hashes, package names, and network IOCs for identifying the fraudulent apps.
Detection Engineering Assessment
EDR Visibility: Low — EDR is typically not deployed on personal mobile devices where these apps are downloaded. Network Visibility: Medium — Network traffic to the identified Firebase C2 domains can be monitored on corporate Wi-Fi or via mobile network gateways. Detection Difficulty: Moderate — Relies on MDM to spot specific malicious package names or network monitoring to catch Firebase C2 traffic, which blends with legitimate Firebase usage.
Required Log Sources
- Mobile Device Management (MDM) app inventory
- DNS query logs
- Firewall traffic logs
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Mobile devices on the corporate network are communicating with known CallPhantom Firebase C2 domains. | DNS query logs, Firewall traffic logs | Command and Control | Low (if matching specific full domain names, though Firebase itself is highly prevalent) |
Control Gaps
- Lack of MDM on BYOD devices
- Google Play Store app vetting bypass
Key Behavioral Indicators
- Presence of specific Android package names (e.g., com.pixelxinnovation.manager)
- Network connections to specific Firebase Realtime Database instances
False Positive Assessment
- Low
Recommendations
Immediate Mitigation
- Uninstall any identified CallPhantom apps from mobile devices.
- Cancel any active subscriptions associated with these apps via the Google Play Store or third-party payment providers.
Infrastructure Hardening
- Block known CallPhantom Firebase C2 domains on corporate network firewalls and DNS filters.
User Protection
- Implement Mobile Device Management (MDM) to restrict the installation of unapproved applications on corporate-owned devices.
Security Awareness
- Educate users on the technical impossibility of apps retrieving third-party call logs without authorization.
- Warn users about the risks of entering credit card information directly into unverified mobile applications.
MITRE ATT&CK Mapping
- T1437.001 - Application Layer Protocol: Web Protocols
- T1643 - Generate Traffic from Victim
Additional IOCs
- Domains:
call-history-ecc1e-default-rtdb[.]firebaseio[.]com- Firebase C&C domain used by CallPhantomchh1-ac0a3-default-rtdb[.]firebaseio[.]com- Firebase C&C domain used by CallPhantom
- File Hashes:
87F6B2DB155192692BAD1F26F6AEBB04DBF23AAD(SHA1) - Malicious APK (com.pixelxinnovation.manager) with 1M+ downloadsFC3BA2EDAC0BB9801F8535E36F0BCC49ADA5FA5A(SHA1) - Malicious APK (com.app.call.detail.history) with 1M+ downloads799BB5127CA54239D3D4A14367DB3B712012CF14(SHA1) - Malicious APK (all.callhistory.detail)
- Other:
calldetaila.ndcallhisto.rytogetan.ynumber- Malicious Android package namecom.pixelxinnovation.manager- Malicious Android package namecom.app.call.detail.history- Malicious Android package name