The rapid global evolution of technology has led to a significant shift in the field of cybersecurity. The advent of technologies such as Artificial Intelligence, Machine Learning, Blockchain, and Data Science has significantly increased the complexity and demand for research in the field of cybersecurity. Numerous authors and academics consistently engage in endeavors within this field to enhance existing implementations. Due to this process of evolution, several entities have experienced growth, leading to the transformation of numerous small-scale organizations into large-scale counterparts. The advent of the internet has resulted in significant growth for companies, albeit with divergent outcomes. Researchers are utilizing the internet to advance technological developments, while concurrently, certain individuals persistently seek means to undermine this technology. In conjunction with the proliferation of the internet, mobile phones have acquired a heightened level of sophistication, particularly with the advent of the Android operating system, leading to a shift in the manner in which individuals utilize these devices. As the Android operating system continues to advance, individuals are increasingly embracing and incorporating its features into their daily lives. Nevertheless, there are those that persistently endeavor to discover methods for illicitly extracting information from Android smartphones via a covert communication channel. This work introduces a novel methodology for transmitting confidential data, such as contact information and text messages, utilizing a concealed audio channel. The researchers conducted trials utilizing the most recent Android smartphones and arrived at the conclusion that it is feasible to transmit critical information to Android using this methodology. The experiment was conducted by the authors using various detection techniques, and it was determined that none of these tools are capable of detecting a hidden channel of this nature.