It sounds like a puzzle worthy of a Sherlock Holmes novel. How *would* cybercriminals extract information from a malware-infected computer that they *don’t* have physical access to, and that *isn’t* ...