Can Cyber Threats Poison Your Construction Data?