The first stage of the process is to decompile a legitimate banking app. This allows the attackers to add code of their own, ...