Hackers then use these devices to send messages or request money from the victim's contacts under false pretenses.