An Android malware, which goes by the name 'FakeCall' may be redirecting your bank calls to cybercriminals. First discovered by Kaspersky back in 2022, the new version of FakeCall was recently updated with new features that allow attackers to remotely take over your smartphone. According to a recent report by the cybersecurity firm Zimperium, the new version of FakeCall uses a technique called 'Vishing', which is a short form for voice phishing. It involves making fraudulent phone calls or sending voice messages to users and deceiving victims into sharing sensitive information like credit card numbers, login credentials and other banking details. When unsuspecting Android users download and install an APK file on their phone, FakeCall asks users to set itself as the default dialer app. Once it has the required permission, the malware gets control over your device using the Accessibility service and takes notes of all outgoing and incoming calls. If you make a call to your bank, it is redirected to cybercriminals instead of a hacker who then asks the user for sensitive information like OTP and password so they can steal money from their account. Once installed, the Android malware can also record your screen, take screenshots, unlock the device and even disable auto-lock. Unlike most mobile malware, FakeCall is really hard to detect since it deceives users using a fake UI that looks exactly like the real Android call interface with the real bank phone number. As it turns out, FakeCall malware has been spreading via websites that imperson the Google Play Store. While the cybersecurity firm Zimperium suggests that there are 13 apps used to spread the malware, it is yet to identify the names of these apps. To stay protected from FakeCall, make sure you avoid installing any apps that are not from the Google Play Store or other unverified app stores. Some other ways to stay protected against such mobile trojans include rebooting your phone every week and scanning the device using antivirus tools.