CIA operators reportedly use Assassin as a C2 to execute a series of jobs, collect, after which you can periodically send user info for the CIA Listening Article(s) (LP). Comparable to backdoor Trojan actions. Both AfterMidnight and Assassin operate on Home windows working method, are persistent, and periodically beacon to their configured LP to bo