Security researchers set up a remote machine and recorded every move cybercriminals madeincluding their login details.