Is Your Phone Compromised? Signs of Stealthy Malware Infection