CyberSpecta Logo
Data TheftBy CyberSpecta

Researchers Expose 28 Google Play Apps Selling Bogus Call Records

Share

A group of fraudulent Android apps claiming to provide call histories, SMS records, and WhatsApp call logs for any phone number amassed more than 7.3 million downloads on Google Play before being removed, according to research published by ESET on WeLiveSecurity.

The apps, which ESET researchers collectively named CallPhantom, promised users access to private communication records in exchange for payment. In reality, the apps had no such capability. Instead, they displayed fabricated data, often generated from hardcoded names, numbers, call times, and durations embedded directly in the app code.

Because apparently even scams now come with subscription tiers. Humanity continues to innovate in the worst possible direction.

Apps promised private call records, but delivered fake data

ESET’s investigation began in November 2025 after researchers found a Reddit post discussing an app called Call History of Any Number, available on Google Play. The app claimed it could retrieve the call history of any phone number entered by the user. It was published under the developer name Indian gov.in, although ESET found no real connection to the Indian government.

Analysis showed that the “results” shown by the app were entirely fake. Rather than retrieving actual records, the app generated random phone numbers and matched them with fixed names, timestamps, and call durations stored in the app’s code. These fabricated records were then presented to users only after they paid.

ESET later identified 28 related apps on Google Play using the same basic deception. While the apps differed in design and presentation, their purpose was the same to convince users they could access private communication data, then charge them for fabricated results.

ESET reported the full set of apps to Google on December 16, 2025. According to the report, all identified apps had been removed from Google Play by the time of publication.

India and Asia-Pacific users were heavily targeted

The CallPhantom apps appeared to primarily target Android users in India and the wider Asia-Pacific region. Several apps had India’s +91 country code preselected, and many supported UPI, a payment system widely used in India.

The apps also attracted negative reviews from users who said they had been scammed and never received the promised data. ESET noted that scammers likely exploited curiosity around private information, making the fake service seem tempting to users. A few positive reviews, likely fake or manipulated, may have helped make the apps appear more credible.

Two main CallPhantom app clusters

ESET identified two main clusters of CallPhantom apps. The first cluster generated partial fake results before asking users to pay. These apps contained hardcoded names, country codes, and message templates, and then combined them with randomly generated phone numbers. Users were shown limited “results” and asked to pay to unlock the full fake history.

The second cluster asked users to enter an email address where the alleged call history would supposedly be delivered. In these cases, users had to pay or subscribe before any results were allegedly sent.

Despite their claims, the apps did not request intrusive permissions because they did not need them. ESET found no functionality in the apps capable of retrieving real call logs, SMS records, or WhatsApp call data from another phone number.

Some apps bypassed Google Play billing

ESET observed three payment methods across the CallPhantom apps. Some apps used Google Play’s official billing system for subscriptions. That method falls under Google’s standard subscription and refund process.

Other apps use third-party payment apps supporting UPI. In some cases, payment links were hardcoded into the apps. In others, the links were fetched from a Firebase Realtime Database, allowing the operators to change payment accounts remotely.

A third group of apps included payment card checkout forms directly inside the app.

The latter two methods violate Google Play’s payment policies, according to ESET. They also make refunds harder for victims, since Google cannot cancel or refund payments made outside its official billing system.

ESET also found one app using deceptive notifications to push users into paying. If a user exited without subscribing, the app displayed alerts styled as new emails claiming the call history results had arrived. Tapping the notification led back to a subscription screen.

The requested fees varied widely. Some apps offered weekly, monthly, or yearly subscription packages. ESET found the highest requested price was US$80, while the average price for the lowest subscription tier was around €5.

What victims can do

Users who subscribed through Google Play can cancel subscriptions in the Play Store app by going to:

Profile icon → Payments & subscriptions → Subscriptions → Select subscription → Cancel subscription

ESET noted that for the 28 apps in its report, existing Google Play subscriptions were canceled when the apps were removed from the store.

Refunds may be possible for purchases made through Google Play, depending on the timing, item type, and Google’s refund policy. Users must submit refund requests within the allowed refund window.

For payments made outside Google Play, such as through UPI apps or direct card entry, Google cannot cancel the subscription or issue a refund. Victims must contact their payment provider, card issuer, or the app developer.

List of Identified Apps

App name

Package name

Number of downloads

Call history : any number deta

calldetaila.ndcallhisto.rytogetan.ynumber

3M+

Call History of Any Number

com.pixelxinnovation.manager

1M+

Call Details of Any Number

com.app.call.detail.history

1M+

Call History Any Number Detail

sc.call.ofany.mobiledetail

500K+

Call History Any Number Detail

com.cddhaduk.callerid.block.contact

500K+

Call History Of Any Number

com.basehistory.historydownloading

500K+

Call History of Any Numbers

com.call.of.any.number

100K+

Call History Of Any Number

com.rajni.callhistory

100K+

Call History Any Number Detail

com.callhistory.calldetails.callerids.callerhistory.callhostoryanynumber.getcall.history.callhistorymanager

100K+

Call History Any Number Detail

com.callinformative.instantcallhistory.callhistorybluethem.callinfo

100K+

Call History Any Number detail

com.call.detail.caller.history

100K+

Call History Any Number Detail

com.anycallinformation.datadetailswho.callinfo.numberfinder

100K+

Call History Any Number Detail

com.callhistory.callhistoryyourgf

100K+

Call History Any Number

com.calldetails.smshistory.callhistoryofanynumber

50K+

Call History Any Number Detail

com.callhistory.anynumber.chapfvor.history

50K+

Call History of Any Number

com.callhistory.callhistoryany.call

50K+

Call History Any Number Detail

com.name.factor

50K+

Call History Of Any Number

com.getanynumberofcallhistory.callhistoryofanynumber.findcalldetailsofanynumber

50K+

Call History Of Any Number

com.chdev.callhistory

10K+

Phone Call History Tracker

com.phone.call.history.tracker

10K+

Call History- Any Number Deta

com.pdf.maker.pdfreader.pdfscanner

10K+

Call History Of Any Number

com.any.numbers.calls.history

10K+

Call History Any Number Detail

com.callapp.historyero

1K+

Call History - Any Number Data

all.callhistory.detail

500+

Call History For Any Number

com.easyranktools.callhistoryforanynumber

100+

Call History of Numbers

com.sbpinfotech.findlocationofanynumber

100+

Call History of Any Number

callhistoryeditor.callhistory.numberdetails.calleridlocator

50+

Call History Pro

com.all_historydownload.anynumber.callhistorybackup

50+

A simple warning sign: no app can do this

The central claim behind CallPhantom was technically impossible in the way these apps presented it. A normal Android app cannot retrieve the call history, SMS records, or WhatsApp call logs of any phone number simply because a user enters that number.

Apps making this kind of promise should be treated as scams. Users should also be cautious of apps that ask for payment before showing results, rely on vague claims, use government-like developer names without proof, or route payments outside the official app store billing system.


Related News

Evolving BBTok Banking Trojan Threatens Latin American Users

Evolving BBTok Banking Trojan Threatens Latin American Users

In a recent cybersecurity revelation, Check Point researchers have uncovered an active and evolving malware campaign that poses a severe threat to banking customers in Latin America. This campaign centers around the notorious BBTok banking trojan, which, since its initial discovery in 2020, has displayed a remarkable ability to adapt and refine its tactics to [...]

Spyware Discovered on Google Play Store Sending Data to China

Spyware Discovered on Google Play Store Sending Data to China

In a recent development, security researchers have uncovered two spyware applications on the Google Play Store, potentially affecting up to 1.5 million users. These malicious apps, disguised as file management tools, are designed to operate silently, stealing sensitive user data and sending it to malicious servers based in China. This article sheds light on the [...]