Well, this is possible using Phishing and keylogging. But, you need to know the hacker to get these working... sounds a little bit difficult though.
like this