How hackers used this Trojan malware to spy on a territorial dispute