According to media reports, four members of the Israeli Modi’in Ezrahi private investigation firm have been sentenced after they were found guilty of using a Trojan horse to steal commercial information.
The Trojan horse, which was designed and marketed by London-based couple Michael and Ruth Haephrati, was said to have been used by a number of different private investigation firms to spy on companies including the HOT cable television group and Rani Rahav PR agency (whose clients include Israel’s second biggest mobile phone operator, Partner Communications).Ã‚Â Another alleged victim was Champion Motors, which imports Audi and Volkswagen motor vehicles.
Asaf Zlotovsky, a manager at the Modi’in Ezrahi detective firm, was given a 19 month jail sentence.Ã‚Â Two other employees, Haim Zissman and Ron Barhoum, were sent to prison for 18 and nine months respectively.Ã‚Â The firm’s former CEO, Yitzhak Rett, escaped a jail sentence after admitting the allegations under a plea bargain – he has been fined 250,000 Israeli Shekels (UKP 36,500) and will face ten months on parole.
“It’s understandable that firms would want information on what their business rivals are planning to do, and try to seek a competitive advantage over them.Ã‚Â What isn’t acceptable is to hire firms that will use illegal methods, such as computer spyware, to gather that information,” said Graham Cluley, senior technology consultant at Sophos.Ã‚Â “Firms need to be very careful about the third parties they hire to help them grow their business, and seek assurances that their partners will not be behaving unethically or illegally.Ã‚Â If they do not, the consequences could not only be a swathe of bad publicity, but also a spell in prison.”
Michael Haephrati, who honed his computer skills during three years’ military service in the Israeli army, and his wife, Ruth, were fined and sentenced to jail by an Israeli court for their involvement in the case in 2006.
“Regular cybercriminals may be attempting to steal your employees’ credit card details, but spyware can also be used for corporate espionage designed to steal your business plans and customer databases,” explained Cluley.Ã‚Â ” Firms should be on their guard and have proper defences in place to avoid falling foul of this kind of attack.”