Once installed, they give attackers complete access to the device, including messages, calls, apps, location data, and the ...