anyone attempting to access these documents to proceed with extreme caution given the potential malware risks . " Australia - based information security researcher Lee Johnstone also expressed concern about the possibility of malware on hacked and leaked documents . " Checking documents and leaks like this should always be conducted in a safe environment on a decentralised virtual machine , " he said .