The tool allows a hacker to steal messages, passwords, photos, location history, and even cryptocurrency wallets.