Security researchers set up a remote machine and recorded every move cybercriminals made—including their login details. Read More