. . "This is the way how most hackers steal credentials and other information." . .