For cybercrime, private accounts protected by authentication keys are valuable sources of information. Email services, banking applications, e-commerce portals and social networks, for example, gain attention from attackers based on information that can be exploited...