Skip to content

ESET Research uncovers CallPhantom scam on Google Play: Fake logs for real money

  • A new Android scam, CallPhantom, falsely claims to provide access to call logs, SMS records, and WhatsApp call history for any phone number in exchange for payment.
  • We identified and reported 28 separate CallPhantom apps on Google Play, cumulatively downloaded more than 7.3 million times.
  • Some CallPhantom apps sidestep Google Play’s official billing system, complicating victims’ refund efforts.

BRATISLAVA, KOŠICEMay 7, 2026 — ESET researchers have uncovered fraudulent apps on Google Play that claim to provide the call history “for any number.” The offending apps, which ESET named CallPhantom based on their false claims, purport to provide access to call histories, SMS records, and even WhatsApp call logs for any phone number. To unlock this supposed feature, users are asked to pay — but all they get in return is randomly generated data. ESET’s investigation identified 28 such fraudulent apps, cumulatively downloaded more than 7.3 million times. As an App Defense Alliance partner, we reported our findings to Google, which removed all of the apps identified in this report from Google Play. 

The CallPhantom apps mainly targeted Android users in India and the broader Asia Pacific region. Many of the apps came with India’s +91 country code preselected, and support UPI, a payment system used primarily in India.

“In November 2025, we came across a Reddit post discussing an app named Call History of Any Number, found on Google Play. Unsurprisingly, our analysis showed that the ‘call history’ data provided by this app is entirely fabricated — the app generates random phone numbers and matches them with fixed names, call times, and call durations, which were embedded directly in the code,” says ESET researcher Lukáš Štefanko, who uncovered the CallPhantom fraud.

In general, CallPhantom apps have a simple user interface and do not request any intrusive or sensitive permissions — they don’t need to. Coincidentally, they do not contain any functionality capable of retrieving actual call, SMS, or WhatsApp data.
In the CallPhantom apps ESET analyzed, researchers saw three different payment methods used, two of which are in violation of Google Play’s payments policy. Some of the apps relied on subscriptions via Google Play’s official billing system. Others relied on payments via a third party; in some cases, payment card checkout forms were included directly in the CallPhantom apps.

The fees requested for the fake service differ widely across the apps. The apps also appear to offer different subscription packages, such as weekly, monthly, or yearly services, with the highest requested price sitting at US$80. For the lowest “subscription tier,” the average requested price was €5.

In general, subscriptions purchased through the official Google Play billing system can be canceled. For the 28 apps described in this blog post, existing subscriptions were canceled when the apps were removed from Google Play. In some cases, refunds for Google Play purchases are possible.

If the purchase was made outside of Google Play — for example, by entering payment card details inside the app or by paying via third-party services — then Google cannot cancel the subscription or issue a refund, and users have to contact their payment provider.

For a more details about CallPhantom, check out the latest ESET Research blog post, “Fake call logs, real payments: How CallPhantom tricks Android users,” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

Examples of CallPhantom apps found on Google Play

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Simplifying Monitoring Architecture | Strategic Guide

The Elegance of Simplification

Strategic Architecture for Complex Monitoring Environments

In technology, we often mistake complexity for power. However, a monitoring platform that requires a dedicated team just to keep it alive has lost its way. Pandora FMS 800 LTS Aquarius introduces a streamlined architecture designed to reduce operational friction and maximize SRE agility.

“A tool that is complex to operate is, by definition, a fragile tool. Real power lies in intelligent consolidation, not infinite fragmentation.”

 

The Operational Trinity

Network Server
The versatile backbone. Consolidates WMI, remote scripts, and web UX into a single, agile role.
High Performance Server
The speed specialist. Engineered for 15-second polling intervals in large-scale centralized architectures.
Heavy Server
The data heavyweight. Manages inventory, vulnerability scans, and complex integrations without impacting core polling.

 

Maintainability as a Survival Requirement

Updating a critical system shouldn’t involve “tension and cold sweat.” The new Pandora_Supervisor acts as a conductor, managing updates and restarts transparently to ensure you never go blind during a maintenance window.

  • Efficiency: No CPU cycles wasted on redundant processes.
  • Scalability: Growth in nodes should not lead to growth in maintenance hours.
  • Resilience: Specialized servers allow for granular load balancing and high availability.

Saily Review: The Future of Global eSIM Connectivity

Managing mobile data during international travel has traditionally been a choice between overpriced roaming or the hassle of local SIM cards. Saily, the new eSIM solution from Nord Security, offers a third way: affordable, secure, and instant digital connectivity.

 

Why Saily Stands Out

  • Global Reach: Access high-speed data in over 200 destinations.
  • Security First: Includes built-in web protection and ad-blocking to preserve data and privacy.
  • User-Centric Plans: Flexible options ranging from 1GB starters to full Unlimited tiers.

Saily Ultra: The All-In-One Subscription

For the frequent globetrotter, Saily Ultra ($29.99/mo) bundles 30GB of data with premium travel perks like airport lounge access and the full Nord Security Suite (VPN, Pass, Locker, and Incogni).

 

Quick Summary

CategoryDetails
Platform SupportiOS, Android, 24/7 Live Chat
Entry PriceCountry plans from $2.99
Special FeaturesCredits & Referrals, Auto Top-up, Business Dashboard
Our Score4.6 / 5

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Top 8 ITDR Tools for MSPs 2026

Strategic Insight: Credential-based attacks have no malware footprint. Without ITDR, intrusions go undetected until data exfiltration or wire fraud occurs.

 

Top ITDR Platforms

1. Guardz

Best for: Unified, MSP-first detection and response. Includes built-in MDR support and multi-tenant management for M365 and Google Workspace.

2. Microsoft Defender for Identity

Best for: Organizations standardized on the Microsoft E5 stack and Entra ID ecosystem.

3. CrowdStrike Falcon Identity Protection

Best for: Tight coupling of endpoint and identity telemetry via a single, unified agent.

 

Solution Comparison

ToolMSP StrengthAutomated Response
GuardzMulti-tenant / Unified MDRSuspend User / Isolate Device
SentinelOnePosture Assessment / DeceptionDisable Account / PW Reset
Okta ITDRContinuous Session MonitoringUniversal Logout
IBM VerifyGovernance & ComplianceAdaptive Access Controls

 

Operational Checklist

  • Prioritize multi-tenant dashboards over per-client logins.
  • Ensure native coverage for M365 Mailbox Rules and OAuth Grants.
  • Verify reversibility of automated actions (e.g., account suspension).

Keepit for monday.com | Data Resilience Guide

While monday.com is essential for daily operations, relying on its native “Trash Can” for data governance is a significant risk. In a world of ransomware and accidental deletions, true business continuity requires an independent recovery strategy.

The Shared Responsibility Model: monday.com ensures the platform is available; you are responsible for ensuring the data inside it is protected from loss, theft, or corruption.
Automated Daily Backups
Daily snapshots of items, boards, and columns with zero manual effort.
Point-in-Time Restore
Recover specific boards or items to their exact state from any historical point.
Ransomware Protection
Immutable, air-gapped storage ensures your backups are shielded from malicious threats.
Unified SaaS Security
One platform to secure your entire stack: Jira, Confluence, Miro, and monday.com.
 

Operational Continuity, Guaranteed

Losing months of project data due to a misclick or a malicious insider shouldn’t be a risk factor for your creative and technical teams. Keepit ensures that your institutional knowledge remains accessible, compliant, and secure—no matter what happens in the production environment.

Zero Standing Privileges in Practice

We are pleased to invite you to an exclusive webinar:

Zero Standing Privileges in Practice

Static accounts are a magnet for attackers—whether they are used by people or machines. To achieve true security, organizations must move to Zero Standing Privileges (ZSP).

Join us to learn how Segura automates “Just-in-Time” access for both users and applications. Discover how to replace hardcoded secrets and “always-on” admin rights with temporary, ephemeral identities that vanish the moment the job is done.

🗓️ Date: 13 May 2026, Wednesday 🕒 Time: 3pm – 4pm SGT 💻 Venue: Gotowebinar 🌐 Language: English 👨🏻‍💻 Speaker: Kenneth Lo

Hotline (65) 6296 4268 | Email: sales@version-2.com.sg
Website: www.version-2.com.sg | www.v2catalog.com

Graylog 7.1: May the Logs Be With You

2025-12-22   A log correlation engine automates the process of linking fragmented event data across diverse systems, transforming raw logs into real-time, actionable insights. By normalizing data and applying correlation rules, it reduces alert fatigue, accelerates incident detection (MTTD), and enables faster root cause analysis for improved security and operational efficiency.

Continue reading

runZero 4.9: IT/OT Topology & Attack Path Mapping

In converged IT/OT environments, visibility is the foundation of defense. runZero 4.9 moves beyond asset lists to provide a unified source of truth, visualizing reachability and highlighting the risks that matter most.
Strategic Insight: 30% of OT assets are typically only one hop away from an internet-exposed device. runZero identifies these hidden “bridges” before attackers do.
 

Attack Path Mapping

Visualize 2D and 3D trajectories from initial compromise to operational shutdown. Identify high-risk pivot points and harden your choke points.

 

Sub-Asset Discovery

Peer behind protocol gateways like Modbus and BACnet to enumerate the PLCs and fieldbus devices that were previously invisible.

 

Bridge Detection

Automatically surface “multi-homed” devices connected to multiple networks, bypassing your firewall and segmentation strategies.

 

Operationalizing the Air-Gap

Stop relying on the “Segmentation Illusion.” runZero 4.9 ensures your air-gap is a reality by unmasking “insecure by design” protocols and identifying the forgotten workstations that turn minor IT breaches into catastrophic operational failures.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Portnox Connect for Windows: Frictionless Security

Portnox Connect for Windows

Eliminating the Onboarding Friction in Secure Access

Onboarding users to a secure, certificate-based network has traditionally been a logistical challenge. Portnox Connect for Windows removes the complexity, allowing organizations to maintain the highest security standards while providing a “two-click” experience for the end user.
Why Automation Matters: Manual certificate installation and network configuration are prime sources of misconfiguration. By automating these tasks, Portnox reduces support tickets and eliminates the human error that leads to vulnerabilities.
 

Operational Impact

For IT Teams: Reduced helpdesk volume, faster hardware rollouts, and guaranteed policy compliance across all endpoints.
For End Users: A clean, intuitive onboarding wizard that handles security configurations in the background.
 

Zero Trust Ready

In modern, perimeter-less environments, consistent verification is essential. Portnox Connect ensures that every Windows device is properly provisioned and verified before gaining network access—seamlessly aligning your fleet with a Zero Trust security framework.

2026 MSP Threat Report Summary

The era of the “break-in” is over. Attackers are now leveraging valid credentials and session tokens to bypass traditional perimeters. The latest telemetry from Guardz highlights a shift toward quiet, identity-driven campaigns.

89%
SMBs with confirmed credential compromise
2,000%
Spike in Google Workspace OAuth abuse
25:1
Non-human to human identity ratio
 

The Evolution of Stealth: BEC 3.0

Attackers are moving away from loud malware and toward “living-off-the-land” techniques. By monitoring legitimate email threads for weeks, adversaries use AI-generated voice and context-aware messaging to authorize fraudulent transactions without ever triggering a security flag.

 

RMM: The New Command & Control

RMM tool abuse now accounts for 26.2% of all endpoint threats. By exploiting legitimate tools like ScreenConnect and NinjaRMM, attackers create encrypted channels that are indistinguishable from authorized MSP traffic.

 

Immediate Operational Priorities

  • Phishing-Resistant MFA: Standardize on FIDO2/Passkeys to prevent session hijacking.
  • OAuth Governance: Audit application grants and enforce admin-level approval requirements.
  • Behavioral Monitoring: Monitor inbox rules and non-human identity patterns in real-time.
  • Kill Legacy Auth: Disable outdated protocols via Conditional Access to prevent MFA bypass.

Download the full 2026 State of MSP Threat Report