Remote access to the camera, microphone recording, and screen capturing.

Managing files, installing additional malicious APKs, and logging every keystroke via a built-in keylogger.

Stealing SMS messages, call logs, contacts, and account credentials.