Attackers can take advantage of the fact these apps access, gather, store and transmit more information than any other app their victims have installed.
Source: Threadpost