blog site write-up by Symantec, which was ready to attribute the "Longhorn" things to do towards the CIA according to the Vault 7, this kind of back-conclusion infrastructure is described:The set up and persistence means of the malware will not be described intimately during the doc; an operator will have to depend on the accessible CIA exploits an