SHARE
Facebook X Pinterest WhatsApp

Latest Espionage Case Underlines Threat

An industrial espionage ring currently under investigation in Israel is the largest case seen to date, said one security expert Tuesday, and likely to repeat itself in the future. Police in Tel Aviv are currently investigating 18 individuals in Israel and London involved in a scheme to grab sensitive corporate information from competitors and use […]

Written By
thumbnail Jim Wagner
Jim Wagner
Jun 1, 2005
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

An industrial espionage ring currently under investigation in Israel is the largest case seen to date, said one security expert Tuesday, and likely to repeat itself in the future.

Police in Tel Aviv are currently investigating 18 individuals in Israel and London involved in a scheme to grab sensitive corporate information from competitors and use it to gain an advantage in bids for service and garner information on the competitors’ corporate networks.

According to the authorities, the industrial espionage was perpetrated using a Trojan horse attached to e-mails, which were then subsequently installed by company employees. With the application in place, they said, information taken from corporate hard drives was sent to FTP servers located around the world.

The report also notes Interpol and the U.S. FBI were notified of the espionage ring, though FBI officials were not available for comment at press time.

The crimes were allegedly conducted at the behest of individual companies by several Israeli private investigations firms. Executives at Israeli-based telecom Bezeq reported over the weekend to the Tel Aviv Stock Exchange that officials from two of its subsidiaries, Pelephone and DBS Satellite Services, were involved in the espionage ring.

Bezeq itself was one of the victims of the activities, the statement read, and company officials were summoned by police to assess the extent of the damage caused by the leaked information.

This article was first published on internetnews.com. To read the full article, click here.

  SEE ALL
ARTICLES
 

Recommended for you...

AI in Cybersecurity: The Comprehensive Guide to Modern Security
Liz Ticong
Apr 29, 2024
What Is Cybersecurity? Definitions, Practices, Threats
Liz Ticong
Apr 8, 2024
How to Secure a Network: 9 Key Actions to Secure Your Data
Liz Ticong
Mar 21, 2024
7 Best Data Security Software: Solutions For 2024
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.