They use mysql exploit scanner using windows xp, vista or seven to install and download. The search engine finding article finds url links that are vulnerable to attack easily. The fake username is used fequently showing all the details openly that they want. Many newbies don't know if there is a worm planted in so they need to search everything quickly and fast before the computer becomes corrupted. You must listen to my advice because I want to help you solve this problem now.
You can see the result using tool available like prorat and anonymous mails tutorial from beginner newbies young old to advance. Beware when you open anything using exe format cd usb because it might have a spy robot that can see what you are doing and steal all your details and information. Some uses clones that looks exactly like site like friendster or banks. Once you enter, they know everything and start to make use of your number now. There are many cases where many customers lost their money instantly. Be careful when you are online and make sure you use antivirus like avg or kaspersky and do not click anything without iphone checking everything. There is a law against these crime, so take precaution okay. People are starting to be afraid and use many ways to be safe. Make a report on the dangerous exploit that you see and new things are being taught teaching to many youngsters teenagers all over the world now.