Infected Peripheral Devices

As part of an academic security research that included the scanning of repositories of files, researchers came across classified operational documents that belonged to a large natural gas utility operator. When approached by the researchers, the utility’s security team was surprised to discover that the documents were authentic and there was no internal evidence that had been taken out.