Contact us

BOOK A PRESENTATION

Feature Spotlight: Ongoing Call Detection

NO NAME
With sophisticated social engineering attacks on the rise, simply securing data within your app is no longer enough. That’s why we’re excited to introduce a new layer of mobile security: Ongoing Call Detection.

What is Ongoing Call Detection?

Available for both iOS and Android,  this feature allows the app to detect when a call is in progress while the application is running.

Why does that matter?

Phone calls have become one of the most dangerous attack vectors in modern mobile fraud.

Ongoing Call Detection adds an extra line of defense against voice-based social engineering attacks, helping identify situations where users may share confidential information over the phone while using your app.

The Problem: Social Engineering in the Age of Smartphones

It starts with a phone call.

A scammer poses as someone from the user’s bank or a trusted support team. They explain there's a problem with the user’s account - perhaps suspicious activity or a blocked transaction. To "resolve" it, they ask the user to open their mobile banking app immediately.

Trusting the voice on the line, the user unlocks their phone and opens the app.

At that moment, Ongoing Call Detection activates.

The app notices that a call is in progress. Depending on the configuration, one of two things happens:

  • The app automatically shuts down, preventing any further access or data from being displayed while the call is ongoing.
  • Or, it displays a warning message:

“You're currently on a call. Be cautious - never share login credentials or security codes over the phone.”

This subtle disruption can be all it takes to break the attacker’s momentum and make the user think twice.

These attacks aren’t theoretical. They happen every day, especially to less tech-savvy users. But with Ongoing Call Detection, your app becomes part of the defense - alert, aware, and ready to intervene at the exact moment when necessary.

How the App Responds to Ongoing Call Detection

One of the key strengths of the Ongoing Call Detection feature is how configurable and adaptive it is. Much like other mobile threat detections, such as screen recording, jailbreak, or rooting, this detection is fully integrated into the configuration wizard, allowing for tailored responses based on app requirements or individual user profiles.

Here are the available reaction options when a call is detected:

1. Notify the End-User

The app can show a clear, contextual warning to the user, such as:

“You're currently on a call. Be cautious about sharing sensitive information. This call may not be secure.”

This soft intervention is ideal for encouraging safer behavior without interrupting the user experience.

2. Terminate the App

In higher-risk environments, such as financial, government, or enterprise apps, the app can be configured to automatically shut down when a call is detected, especially during sensitive operations like logging in, accessing data, or making payments.

This hard stop ensures no information is unintentionally leaked or submitted under pressure.

3. Generate False Values

A unique and clever security approach - the app can be set to return fake or redacted information during a call session. For example, instead of showing real account balances, personal details, or confirmation codes, the app may display placeholder or zero values until the call ends.

This approach protects users from being manipulated in real time while maintaining session continuity.

Targeted Configuration Options

This detection is not one-size-fits-all. You can configure responses at two levels:

  • Per Mobile App – Define global behaviors for all users of a specific app version.
  • Per User – Apply tailored policies for high-risk individuals or user groups (e.g., VIP clients, internal employees, etc.).

Important to mention, Ongoing Call Detection is not classified as a “mobile app attack” and is treated separately in reporting and monitoring. This ensures accurate analytics and better separation between environmental context and actual device compromise.

Ongoing Call Detection Use Cases

Here are some realistic scenarios where this feature can prove to be useful:

1. Banking App + Fake Bank Call

A user receives a call claiming to be from their bank’s fraud department while logging in to the mobile banking app. The scammer would typically claim something like “We've just detected suspicious activity, please confirm your credentials.” Ongoing call detection would stop the user from logging in to the banking app and unknowingly share sensitive information with the scammer.

2. Payment App + Phishing Attack

During a call from someone pretending to be a merchant or family member, a user opens a peer-to-peer payment app to send money. The scammer guides them through steps to send funds under false pretenses. In case the ongoing call detection is implemented, such scams would simply fail.

3. 2FA Interception Scam

Scammers sometimes convince users to read out one-time passcodes (OTPs) from their authenticator apps.

If Ongoing Call Detection is active when the user attempts to generate an OTP, the app could:

  • Terminate immediately.
  • Generate false OTPs.

4. Enterprise/Work App Confidentiality

A remote employee on a call with someone impersonating IT support opens a corporate app. The app detects the call and triggers a warning about potential phishing or data leaks, encouraging the employee to confirm the support agent’s identity.

Wrap Up: Ongoing Call Detection For Contextual Security

Ongoing Call Detection adds context awareness to mobile security - a crucial step in staying ahead of fraudsters who rely not on technical exploits, but human vulnerability.

Security isn't just about encryption and authentication anymore. It's about understanding the context in which users interact with your app. By recognizing the risks introduced by phone calls during sensitive moments, we can protect users at their most vulnerable.

Let us know how you’re planning to integrate Ongoing Call Detection in your app, and stay tuned for more proactive security tools in the pipeline.

Download App Protector SDK

App Protector SDK is a mobile security component built into the application's code enabling runtime protection as well as a variety of mobile application hardening techniques, including jailbreak detection.

Want to learn more about cybersecurity trends and industry news?

SUBSCRIBE TO OUR NEWSLETTER

CyberSecurityhub

chevron-down linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram