Trojan horse helped assassins track Hamas victim

Filed Under: Law & order, Malware, Social networks

Many of you will probably remember the CCTV footage of alleged assassins, dressed in disguises of tennis gear, and carrying racquets, as they strolled through a luxury hotel when it was shown early last year.

Mahmoud al-Mabhouh, a senior Hamas official, was murdered at Dubai's al-Bustan Rotana hotel by a professional assassination team of 11 people.

The news of the killing made headlines around the world, including in Britain where there was a diplomatic scuffle when it was revealed that the suspects had apparently used cloned British passports to disguise their true identities.

Tennis assassins

Many people pointed the finger of suspicion at Mossad, Israel's foreign intelligence agency.

Now, a new report by investigative reporter Ronen Bergman published in GQ Magazine, gives the story a computer security spin.

Bergman claims that the assassination team were able to track al-Mabhouh's movements and plans because they had planted a spyware Trojan horse on his computer. This gave them the ability to monitor his email communications and other online activities.

MossadIf true, it wouldn't be the first time that Mossad has been accused of planting malware on the computers of its enemies.

For instance, in 2006 a high-ranking Syrian official is said to have left his laptop unattended in a swanky London hotel room, allowing agents to plant malware on the computer.

Information stolen from the hacked laptop is said to have resulted in an air-raid on a nuclear project in Syria's eastern desert the following year.

Not all operations move so slickly, of course.

After the assassination in Dubai of the Hamas commander, the New York Times spotted a bad taste joke about a Dubai "hit" had been published on the Israeli embassy's Twitter page:

Tasteless tweet

A member of staff was subsequently reprimanded, and the message deleted.

So, what's the lesson for the rest of us? Those of us who aren't spies or government agents and don't have enemies tracing our movements?

Well, my advice is to keep your computer and the data stored upon it safe and sound. If you have sensitive information on your PC - make sure it is properly protected with security software and that any confidential data is encrypted. Also, be careful about what programs you install and how you connect to the internet.

And don't leave your laptop lying around unattended (even in a locked hotel room) because you never know who might be able to gain access to it, and what they may plant upon it.

Also, I think we have to acknowledge that intelligence agencies and governments around the world have no qualms about using malware and internet snooping tools if they believe it will give them an advantage over their enemies.

, , , , ,

You might like

3 Responses to Trojan horse helped assassins track Hamas victim

  1. Jay · 1331 days ago

    Wow I am awe inspired you actually created a post, not a rant, mentioned israel and didn't vilify and de-legitimized it...Its a rare thing in the web of today.

    As a long time reader of the blog via Google feeds, I must admit I missed a heart beat seeing *israel* suddenly in the feed window.

    May God bless you graham cluley

  2. Opie · 1325 days ago

    If it was the Mossad's doing, they would have just had one of their shark agents kill him while he was swimming in the pool.

  3. Chris · 1226 days ago

    "Also, I think we have to acknowledge that intelligence agencies and governments around the world have no qualms about using malware and internet snooping tools if they believe it will give them an advantage over their enemies."

    This is blindingly obvious. We know agencies and governments are willing to kill, so they're hardly going to restrict malware use.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Graham Cluley runs his own award-winning computer security blog, and is a veteran of the anti-virus industry having worked for a number of security companies since the early 1990s. Now an independent security analyst, he regularly makes media appearances and gives computer security presentations. Send Graham an email, subscribe to his updates on Facebook, follow him on Twitter and App.net, and circle him on Google Plus for regular updates.