Whitepaper written to demonstrate that a shadow software attack is still possible. Winner of the ISW contest.