21 of 23Image
Should the 'target' accept a popup, for example, this can lead to the silent installing of the FinSpy tracking software, giving headquarters full access to the infected computer.
Perhaps most ominous of all these tracking products, FinFly ISP would involve an 'agent' deploying the server into the core network.
This server can then be used to analyse traffic for "easy 'target' identification". It is thought that combined hardware and software efforts offer similar (or exact) functionality to deep packet inspection.