It very first infects a World-wide-web-linked computer in the Business (often called "Major host") and installs the BrutalKangerooAlthough CIA property are occasionally utilized to bodily infect systems inside the custody of a focus on it is probably going that numerous CIA physical access attacks have infected the targeted Business's source chain