. . . "The attackers are looking for information such as design documents that could help them mount a future attack on an industrial control facility." .