{{CANONICAL}}
← Back to Tech News

ESET Research uncovers CallPhantom scam on Google Play: Fake logs for real money

ESET researchers have discovered a sophisticated scam operation on Google Play involving 28 fraudulent applications that collectively garnered over 7.3 million downloads. The malicious apps, dubbed "CallPhantom" by ESET, falsely claimed to provide users with call histories, SMS records, and WhatsApp call logs for any phone number in exchange for payment. Instead of delivering the promised data access, these applications generated fake, randomly created logs while collecting money from unsuspecting users. The security firm's investigation revealed that the scam apps were designed to exploit users' curiosity about accessing private communication records of others. Once users paid for the supposed premium features, they received fabricated data that appeared legitimate but contained no actual call or message history. As part of Google's App Defense Alliance partnership, ESET reported their findings to Google, which has since removed all identified fraudulent applications from the Play Store. This discovery highlights ongoing challenges with app store security and the persistence of scam applications that target users willing to pay for access to sensitive data. The scale of the operation, with millions of downloads across nearly three dozen apps, demonstrates how fraudulent developers can successfully distribute malicious software through official channels before detection.

Why It Matters

This discovery underscores critical vulnerabilities in Google Play's app vetting process and reveals how scammers are exploiting users' desire to access private communications data. The massive download numbers indicate that millions of users may have been financially defrauded while potentially exposing their own devices to malicious code. For enterprise security teams, this highlights the importance of mobile device management policies and user education about the risks of downloading apps that claim to provide unauthorized access to communication data.

Read Original Release →
Note

This summary is generated using AI analysis of the original press release. Always refer to the original source for complete details.