The article highlights a significant security issue involving 28 fake call history apps that have been downloaded over 7.3 million times from the Google Play Store. These malicious applications are designed to trick users into stealing their payments, posing a serious threat to Android users.
Key Points:
-
App Names and Descriptions:
- The apps masquerade as legitimate call history management tools.
- They often have names like "Call History Manager," "Instant Call Info," or similar titles that sound useful but are actually deceptive.
-
Malicious Behavior:
- Upon installation, these apps request permissions to access the user's device and personal data.
- Once granted permission, they silently install a banking trojan in the background.
- The trojan then monitors the user’s financial transactions and attempts to steal payment information or redirect payments.
-
Command & Control (C2) Infrastructure:
- The apps communicate with Firebase-hosted C2 servers using IP addresses like
34.120.160[.]131and34.120.206[.]254. - These servers are used to deliver malicious commands and
- The apps communicate with Firebase-hosted C2 servers using IP addresses like
Read the full article at Cyber Security News
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

![[AINews] The Unreasonable Effectiveness of Closing the Loop](/_next/image?url=https%3A%2F%2Fmedia.nemati.ai%2Fmedia%2Fblog%2Fimages%2Farticles%2F600e22851bc7453b.webp&w=3840&q=75)



