Common WhatsApp Hacking Techniques: Understanding the Threat Landscape