can exfiltrate the stolen credentials to your CIA-controlled server (Hence the implant in no way touches the disk to the goal procedure) or reserve it within an enrypted file for later on exfiltration by other implies. BothanSpy⁕in Laptop or computer sciences, the return value of a perform, state of the method or list of information matching a qu