Recently, I stumbled upon this which nicely showed how a Trojan horse can, utilizing a key stroke capture and screenshot capture, grab a user

The link for this article located at SecuriTeam is no longer available.