Basically it can steal just about anything on a targeted system; however, it looks like the attackers were particularly interested in collecting passwords, taking desktop screenshots()to spy on the user’s action, and stealing various kinds of documents. This heralds the entry into an era in which technology user by cybercriminals has advanced to such a degree that they are capable of successfully carrying out industrial espionage, and, by extension, blackmail and extortion