An ambitious attempt to spy on foreign ministers as they negotiated over Iran's nuclear programme came to light yesterday when a cyber security firm uncovered new malware called "Duqu 2".
The company which found the highly sophisticated virus, Kaspersky Lab, said that only a state could have been responsible for its development - but declined to name the country involved. However, Kaspersky disclosed enough evidence to implicate Israeli intelligence. Israel has closely followed the talks over Iran's nuclear ambitions, with Benjamin Netanyahu, the Prime Minister, denouncing a possible agreement as a "historic mistake".
Last year, Kaspersky's own systems were infected with Duqu 2, perhaps to discover how to penetrate cyber defences. When the company tried to establish who else had been targeted, it discovered that three luxury hotels in Europe had been singled out.
The hotels had one thing in common: each had hosted nuclear negotiations between John Kerry, the US secretary of state, and his Iranian counterpart, Mohammad Javad Zarif. In every case, the malware had been infiltrated into the relevant hotel systems a few weeks before the meetings between Zarif and Kerry. These vital negotiations are designed to resolve the confrontation over Iran's nuclear ambitions by a deadline of June 30. The talks also include ministers from the "P5 plus 1" group of countries, consisting of the Security Council's five permanent members plus Germany.
But those outside the meetings - particularly Israel - are anxious to gain an insight into their progress.