Once opened, it enables hackers to penetrate through the device firewall and take confidential user information