"Once the phishers have access to users??? e-mail or instant messaging accounts they can use them for fraudulent transactions, or search the users??? messages to find other usernames and passwords used for logging into bank accounts and other financial services." . . . .