In this episode we describe how tools from operational technology red team exercises are being repurposed for malware attacks.