It is hard to defeat technical system security. However,  it is easy to trick system operators into compromising system security. People are the weakest link in cybersecurity. Realizing that even rebel fighters need love, cyberwarriors supporting the Syrian regime used the oldest trick in the book — feminine allure — for cyberespionage. In a modern update of Mata Hari, Syrian cyberwarriors created a fake online persona and used it to trick a rebel fighter into compromising his system.

Mata Hari 2.0

Mata Hari 2.0

This is an excerpt from the online chat:

syrian chat

With ill-gotten system access yielded through deception, forces loyal to Assad were able to collect valuable intelligence on the insurgency.  The New York Times has the full report.