The exploit, which has long been theorized, was confirmed by computer security researchers. By using invisible overlays and some clever social engineering, hackers can quickly gain full control to an Android device.
https://www.notebookcheck.net/Cloak-and-Dagger-vulnerability-can-leave-your-Android-phone-open-to-attack.224070.0.html