If an adversary focused on the fictional Dunder Mifflin office, how could they approach an offensive cyber operation?