Is Malware Using Steganography on Your Network?