The criminals use programs that insert themselves into people’s
computers, then search for sensitive financial data or do other tasks
like recording keystrokes as computer users log on to their personal
accounts. The programs then automatically send what they find back to
their mother computers over the Internet, where criminals retrieve the
information and use it to close out bank or stock accounts.