{"id":3004,"date":"2026-05-11T12:21:50","date_gmt":"2026-05-11T12:21:50","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/"},"modified":"2026-05-11T12:21:50","modified_gmt":"2026-05-11T12:21:50","slug":"fake-call-logs-real-payments-how-callphantom-tricks-android-users","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/","title":{"rendered":"Fake call logs, real payments: How CallPhantom tricks Android users"},"content":{"rendered":"<div>ESET researchers uncovered fraudulent apps on Google Play that claim to provide the call history \u201cfor any number\u201d and had been downloaded more than seven million times before being taken down<\/div>\n","protected":false},"excerpt":{"rendered":"<p>ESET researchers uncovered fraudulent apps on Google Play that claim to provide the call history \u201cfor any number\u201d and had been downloaded more than seven million times before being taken down<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[90,269],"tags":[91],"class_list":["post-3004","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-eset-research","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fake call logs, real payments: How CallPhantom tricks Android users - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fake call logs, real payments: How CallPhantom tricks Android users - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"ESET researchers uncovered fraudulent apps on Google Play that claim to provide the call history \u201cfor any number\u201d and had been downloaded more than seven million times before being taken down\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-11T12:21:50+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Fake call logs, real payments: How CallPhantom tricks Android users\",\"datePublished\":\"2026-05-11T12:21:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/\"},\"wordCount\":41,\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\",\"ESET research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/\",\"name\":\"Fake call logs, real payments: How CallPhantom tricks Android users - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"datePublished\":\"2026-05-11T12:21:50+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fake call logs, real payments: How CallPhantom tricks Android users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fake call logs, real payments: How CallPhantom tricks Android users - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/","og_locale":"en_US","og_type":"article","og_title":"Fake call logs, real payments: How CallPhantom tricks Android users - Imperative Business Ventures Limited","og_description":"ESET researchers uncovered fraudulent apps on Google Play that claim to provide the call history \u201cfor any number\u201d and had been downloaded more than seven million times before being taken down","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-05-11T12:21:50+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Fake call logs, real payments: How CallPhantom tricks Android users","datePublished":"2026-05-11T12:21:50+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/"},"wordCount":41,"keywords":["Cybersecurity"],"articleSection":["Cybersecurity","ESET research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/","name":"Fake call logs, real payments: How CallPhantom tricks Android users - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"datePublished":"2026-05-11T12:21:50+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/11\/fake-call-logs-real-payments-how-callphantom-tricks-android-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Fake call logs, real payments: How CallPhantom tricks Android users"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/3004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=3004"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/3004\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=3004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=3004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=3004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}