Users often store passwords in third-party software for convenience – but credential gathering techniques can target this behavior.