I think its possible.
The question is however, why didn't the IT professionals have any log data about where the malware was going. Firewall logs? What did the malware do that was so mal?
There was a data breach, how did they discover the data breach was from the exec if there were no logs of malicious activity on his computer?
The IDS wasn't tripped when data was being sent to China?
They also did not provide any pictures or details about the name of the ecigg.
Wouldn't have been to hard to load it up on a VM and verify it was the charger.
"We have a virus, but how? Oh, its cloudy outside, it must have come from the cloud."
I call bullshit on the story.
Its not social engineering, its reading comprehension.