CIA operators reportedly use Assassin like a C2 to execute a number of duties, obtain, after which you can periodically send user data into the CIA Listening Post(s) (LP). Just like backdoor Trojan habits. Both of those AfterMidnight and Assassin operate on Windows operating program, are persistent, and periodically beacon for their configured LP t