"At any rate, as Pizzle mentioned, a keylogger controlled by the person is the most likely method - but, not knowing exactly what is being 'hacked', there are other possibilities." . . . .