can exfiltrate the stolen credentials to a CIA-controlled server (so the implant hardly ever touches the disk on the concentrate on technique) or put it aside within an enrypted file for afterwards exfiltration by other usually means. BothanSpy"To log into" demands a immediate item to explain what an individual is logging into. I chose "to log into