Mossad Trojan Hacked Secret Data of Syrian Nuclear Reactor

(SpamFighter) A computer Trojan, utilized for intelligence purposes, reportedly revealed critical information about a secret Syrian nuclear reactor that had been demolished and put out of use. Actually, operatives of Israel intelligence agency, Mossad, planted the information collecting code on a Syrian official's laptop during his visit to London (UK), as reported by SoftPedia on November 9, 2009.

An article recently emerged in Der Spiegel (a German publication) that described the incidences, which had resulted in Israel blasting a secret Syrian nuclear reactor located in Al Kibar.

In late 2006 after finding a suitable opportunity, Israeli agents installed a Trojan virus designed to clandestinely capture data from the laptop of the Syrian official. The Trojan revealed construction plans, numerous photographs, and letters in the hard drive of the system. Notably, the photographs showed the Al Kibar compound at its different phases of construction.

Other confidential images and documents were also captured such as photographs of prominent nuclear scientist Chon Chibu of North Korea, along with the Syrian Atomic Energy Commission Director Ibrahim Othman. This intelligence collecting initiative ultimately resulted on "Operation Orchard" in which Israeli fighter planes bombed the Al Kibar infrastructure during September 2007.

The hack's description by journalists of Der Spiegel indicates that the information gathering Trojan was utilized for evading security systems so that data could be seized rather than for any other purpose such as intercepting ongoing e-mail communications.

Expressing his opinion on this point, Bruce Schneier renowned security expert said in a statement that the hack had a close resemblance with an earlier attack "evil maid" that targeted encrypted systems. In such an attack, the person who gains control of a computer temporarily can circumvent its encryption software, warns Schneier, as reported by The Register on November 6, 2009.

As per a long-standing saying which security experts often repeat regarding computer security, in case physical security is absent on a system it means that there is no security whatsoever. Thus, the particular Trojan's story illustrates the adage quite appropriately, said Internet security experts.

Copyright © Jewish Internet Defense Force
All Rights Reserved

The views expressed on this website do not necessarily reflect the views of the JIDF. The content is not intended to malign any religion, ethnic group, club, organization, company or individual. This site's intention is to do no harm, to not injure others, defame, or libel. All data and information provided on this site is for informational, educational, and/or entertainment purposes only. The Jewish Internet Defense Force (JIDF) makes no representations as to accuracy, currentness, correctness, suitability, or validity of any information on this site and will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use, or access to this site. We are not responsible for translation or interpretation of content. We are not responsible for defamatory statements bound to government, religious or other laws from the reader’s country of origin. All information is provided on an as-is basis with no warranties, and confers no rights. We are not responsible for the actions, content, accuracy, opinions expressed, privacy policies, products or services or for any damages or losses, directly or indirectly, caused or alleged to have been caused as a result of your use or reliance on such information on the Jewish Internet Defense Force site. This site includes links to other sites and blogs operated by third parties. These links are provided as a convenience to you and as an additional avenue of access to the information contained therein. We have not reviewed all of the information on other sites and are not responsible for the content of any other sites or any products or services that may be offered through other sites. The inclusion of these links in no way indicates their endorsement, support or approval of the contents of this site or the policies or positions of the JIDF. We have the right to edit, remove or deny access to content that is determined to be, in our sole discretion, unacceptable. These Terms and Conditions of Use apply to you when you view, access or otherwise use this blog and the Website. The JIDF is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to
Related Posts with Thumbnails