1. Technician has a portable computer that is used to connect and update SCADA devices. 2. This computer is also used to carry out other tasks such as viewing e-mails and browsing the Internet. 3. Attackers direct an attack against a vendors’ website. 4. The vendors’ website does not require authentication for downloading firmware updates and related files; which have been previously compromised by the attackers. 5. The technician is unaware that the vendors’ website has been infected, and downloads a firmware file that in reality contains a remote access Trojan horse (RAT) attached to it. 6. Through this malware, several actions are made on the victims’ computer: