Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fraudulent Android Apps Stole Millions via Fake Subscriptions

Fraudulent Android Apps Stole Millions via Fake Subscriptions

Posted on May 8, 2026 By CWS

Fraudulent apps on the Google Play Store have tricked millions of Android users into costly subscriptions, cybersecurity experts have revealed. These deceptive applications, which claimed to offer access to call histories for any phone number, were instead a front for financial scams targeting unsuspecting users primarily in India and the Asia-Pacific region.

Widespread Impact of Deceptive Apps

Slovakian cybersecurity firm ESET identified 28 such applications, collectively downloaded over 7.3 million times, that promised users access to call, SMS, and WhatsApp logs. However, after users made payments, they received only fabricated data. ESET named this deceptive campaign CallPhantom, highlighting its extensive reach, with one app alone surpassing 3 million downloads before removal from the Play Store.

Alarmingly, at least one of these apps was falsely marketed under the developer name ‘Indian gov.in’ to create a false sense of security. Once downloaded, users were prompted to make payments for access to fake data, embedded directly into the app’s code. These activities have been ongoing since at least November 2025.

Mechanisms of the Scam

These fraudulent apps employed various payment methods, including Google Play Store subscriptions, third-party payment apps like UPI, and direct credit card entries, the latter two violating Google’s policies. In some instances, exiting the app without payment triggered misleading notifications, drawing users back to subscription screens with false claims of successful data delivery.

The subscription costs varied, ranging between $6 to $80, impacting users who may have been unaware of the scam until their subscriptions were cancelled following the apps’ removal. While Google Play billing subscribers may seek refunds under Google’s policies, those who paid through other means are reliant on external providers or developers for refunds.

Global Context and Future Concerns

The exposure of this fraud coincides with similar malicious campaigns reported by Group-IB, which estimated that $2 million were stolen from Indonesian users through a campaign involving fake tax platform impersonations and other trusted brands. These operations, linked to the GoldFactory threat cluster, utilized phishing and social engineering tactics to distribute malware and facilitate financial theft.

The ongoing threat emphasizes the need for vigilance among users and highlights the importance of cybersecurity measures to prevent further incidents. As these fraudulent activities continue to evolve, users must remain informed and cautious to protect their financial and personal information.

With the potential for such scams to target broader populations, cybersecurity experts urge users to verify the authenticity of applications and remain cautious of unsolicited payment requests, ensuring that their digital interactions remain secure.

The Hacker News Tags:Android security, Asia-Pacific, Cybersecurity, data privacy, ESET, fake subscriptions, financial loss, fraudulent apps, Google Play Store, Malware, mobile apps, mobile security, Phishing, scam prevention, social engineering

Post navigation

Previous Post: Malware Abuses AI Platforms Hugging Face and ClawHub
Next Post: Online Age Verification Challenges Highlighted by Simple Tricks

Related Posts

Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas The Hacker News
Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access The Hacker News
Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App The Hacker News
DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising The Hacker News
CISA Identifies Exploited Wing FTP Vulnerability CISA Identifies Exploited Wing FTP Vulnerability The Hacker News
Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Online Age Verification Challenges Highlighted by Simple Tricks
  • Fraudulent Android Apps Stole Millions via Fake Subscriptions
  • Malware Abuses AI Platforms Hugging Face and ClawHub
  • ZiChatBot Malware Exploits Zulip APIs for Stealth Operations
  • Cybersecurity: Key Developments and Emerging Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Online Age Verification Challenges Highlighted by Simple Tricks
  • Fraudulent Android Apps Stole Millions via Fake Subscriptions
  • Malware Abuses AI Platforms Hugging Face and ClawHub
  • ZiChatBot Malware Exploits Zulip APIs for Stealth Operations
  • Cybersecurity: Key Developments and Emerging Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark