Sophisticated Cyber-Espionage Exploits Undocumented iPhone Hardware Features