Cybersecurity researchers have uncovered a large-scale Android scam campaign involving fraudulent “call history” applications distributed through the Google Play Store. The malicious apps falsely claimed to provide access to call records, SMS logs, and WhatsApp communication history for any mobile number. Instead of delivering legitimate functionality, the apps tricked users into paying subscription fees for fabricated data. The operation reportedly accumulated more than 7.3 million downloads before the applications were removed from the platform. Researchers from ESET tracked the activity under the name “CallPhantom.” The campaign primarily targeted Android users across India and the Asia-Pacific region. The apps used simple interfaces and avoided requesting suspicious permissions, helping them evade user suspicion and initial security scrutiny. Victims were prompted to purchase subscriptions through Google Play billing, UPI-based payment applications, or embedded card payment forms. In several cases, the applications violated Google Play policies by redirecting users to unauthorized third-party payment channels. Technical analysis revealed that the applications contained no capability to retrieve actual telecom or WhatsApp records. Instead, they generated random fake datasets to convince victims that the service was functioning. Researchers also observed associated social engineering activity on WhatsApp, where attackers distributed malicious APKs capable of deploying Android malware families such as Gigabud RAT, MMRat, and Taotie. These malware strains can steal sensitive information, harvest credentials, and facilitate financial fraud or account takeover attacks
Hackers linked to the ShinyHunters extortion group have claimed responsibility for a data breach affecting Spanish fashion retailer exposing information belonging to more than 197,...
A cyber intrusion targeting the source code infrastructure of Trellix has reportedly been linked to the ransomware and extortion collectiveRansomHouse. The group recently posted se...
Multiple high-severity vulnerabilities have been identified in React Server Components (RSC) and Next.js App Router implementations, exposing web applications to Remote Code Execut...