@pluralistic That such a backdoor would be exploited by foreign intelligence agencies is practically a foregone conclusion as the target is so valuable. The only question is what combination of intelligence sources were used to gain access: hacking, social engineering, human assets within the organization, or some combination. Unfortunately the lesson likely taken is not don't present a large attractive target, but play better whack-a-mole with intelligence leaks.