Later in the article, they elaborated on the attack:
Federal magistrate Judge Kathleen M. Tafoya approved the FBI’s search warrant request on Dec. 11, 2012, nearly five months after the first threatening call from Mo. The order gave the FBI two weeks to attempt to activate surveillance software sent to the texan.slayer@yahoo.com e-mail address. All investigators needed, it seemed, was for Mo to sign onto his account and, almost instantaneously, the software would start reporting information back to Quantico.
The logistical hurdles proved to be even more complex than the legal ones. The first search warrant request botched the Yahoo e-mail address for Mo, mixing up a single letter and prompting the submission of a corrected request. A software update to a program the surveillance software was planning to target, meanwhile, raised fears of a malfunction, forcing the FBI to refashion its malicious software before sending it to Mo’s computer.
The warrant authorizes an "Internet web link" that would download the surveillance software to Mo’s computer when he signed onto his Yahoo account. (Yahoo, when questioned by the Post, issued a statement saying it had no knowledge of the case and did not assist in any way.)
The surveillance software was sent across the Internet on Dec. 14, 2012 — three days after the warrant was issued — but the FBI’s program didn’t function properly, according to a court document submitted in February,
"The program hidden in the link sent to texan.slayer@yahoo.com never actually executed as designed," a federal agent reported in a handwritten note to the court.
But, it said, Mo’s computer did send a request for information to the FBI computer, revealing two new IP addresses in the process. Both suggested that, as of last December, Mo was still in Tehran.
The article doesn't say exactly what kind of exploit FBI hackers embedded in the e-mail. The detail about the attack working as soon as Mo signed onto his account suggests it may have involved a cross-site scripting or cross-site request forgery, possibly used in combination with other techniques. That's pure speculation that could very well turn out to be wrong.
From Ars Technica
Related
FBI Spied On French philosophers Sartre And Camus
Meet the Spies Doing the NSA's Dirty Work