ForumsResources7.3M Downloads: Analyzing the 'Fake Call History' Fleeceware Operation

7.3M Downloads: Analyzing the 'Fake Call History' Fleeceware Operation

OSINT_Detective_Liz 5/8/2026 USER

We often focus on sophisticated zero-days, but sometimes the most impactful threats are the simplest financial scams. Just read the latest report on the 28 fraudulent apps on the Play Store claiming to reveal call histories.

Technically, this falls under Fleeceware. These apps don't necessarily steal credentials (like a banking trojan), but they abuse the BillingClient API to trap users in high-cost subscriptions for non-functional services. With 7.3 million downloads, the scale is significant.

From a detection standpoint, these apps are tricky. They often pass Google Play Protect's static checks because the malicious behavior (charging money) is technically a "feature." However, the payload is often just hardcoded JSON data or a simple WebView loader.

For those managing MDMs or monitoring mobile fleet traffic, I suggest monitoring for specific telemetry patterns. If you have ingestion of mobile billing events or high-cost app interactions, look for multiple subscription activations within a short window from the same device ID.

Here is a basic KQL query to hunt for potential fleeceware behaviors if you are ingesting mobile logs into Sentinel:

DeviceEvents
| where Timestamp > ago(30d)
| where ActionType contains "Subscription" or ActionType contains "Billing"
| extend AppName = tostring(Fields["AppName"])
| extend Price = todecimal(Fields["Price"])
| where Price > 10 // Flagging unusually expensive subscriptions
| summarize EventCount=count(), MaxPrice=max(Price) by AppName, DeviceId
| where EventCount > 2 // Frequent trials/renewals
| project DeviceId, AppName, MaxPrice, EventCount

How are you all handling mobile app vetting for BYOD environments? Is the official store vetting process failing us, or is user education the only real defense here against these "legal" scams?

SE
SecurityTrainer_Rosa5/8/2026

We actually saw a spike in something similar last quarter. The tricky part is that these apps often comply with Google's refund policy initially, making them look legitimate to automated scanners. From an MSP perspective, blocking 'Utilities' categories on managed devices is the only reliable way to stop the bleed, but that doesn't help the BYOD crowd.

PH
PhishFighter_Amy5/8/2026

I pulled the APK for one of these 'Call History' apps last week. Static analysis was interesting—they obfuscated the billing logic but left the 'data retrieval' part completely empty. It was just returning a static JSON string: {"status":"error","msg":"Premium required"}. It's pure social engineering exploiting the desire for espionage on partners. Your KQL query is a good start, but adding a check for 'High Network Low Activity' might help catch the apps that don't actually do anything but talk to the billing server.

MS
MSP_Tech_Dylan5/8/2026

Great breakdown. The social engineering aspect is the real killer here. Users see 4.5 stars and millions of downloads and assume it's safe. I've started adding 'Fleeceware' examples to our quarterly security awareness training because technical controls are lagging behind on mobile. The subscription model is the perfect vector for low-risk, high-reward attacks.

Verified Access Required

To maintain the integrity of our intelligence feeds, only verified partners and security professionals can post replies.

Request Access

Thread Stats

Created5/8/2026
Last Active5/8/2026
Replies3
Views188